CVE-2026-40324: CWE-674: Uncontrolled Recursion in ChilliCream graphql-platform
CVE-2026-40324 is a critical vulnerability in the ChilliCream Hot Chocolate GraphQL server's recursive descent parser, Utf8GraphQLParser, present in versions prior to 12. 22. 7, 13. 9. 16, 14. 3. 1, and 15. 1. 14. The parser lacks a recursion depth limit, allowing crafted GraphQL documents with deeply nested structures to cause a StackOverflowException, which immediately terminates the worker process.
AI Analysis
Technical Summary
Hot Chocolate's Utf8GraphQLParser in affected versions has no recursion depth limit, enabling an attacker to craft deeply nested GraphQL queries that trigger a StackOverflowException in .NET, causing immediate termination of the worker process. This denial-of-service occurs before validation rules run, bypassing protections like MaxExecutionDepth and complexity analyzers. The vulnerability affects versions prior to 12.22.7, 13.9.16, 14.3.1, and 15.1.14. The patch adds a MaxAllowedRecursionDepth option to ParserOptions, enforcing recursion limits and replacing the uncatchable StackOverflowException with a catchable SyntaxException. No application-level workaround exists; only upgrading to patched versions mitigates the issue. Limiting HTTP request body size at the proxy can reduce but not eliminate risk.
Potential Impact
Exploitation causes a StackOverflowException that immediately terminates the worker process running the GraphQL server, resulting in denial of service. All ongoing HTTP requests, background hosted services, and WebSocket subscriptions on the affected worker are dropped. The orchestrator must restart the process, causing service disruption. There is no impact on confidentiality or data integrity. The vulnerability does not allow code execution or data leakage but causes availability loss.
Mitigation Recommendations
A fix is available in Hot Chocolate versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14 that introduces a recursion depth limit to prevent stack overflow crashes. Operators should upgrade to these patched versions to fully mitigate the vulnerability. There is no application-level workaround because StackOverflowException cannot be caught in .NET. Operators can reduce risk by limiting HTTP request body size at the reverse proxy or load balancer, but this is not sufficient to prevent all crashes due to the small size of triggering payloads. Patch status is not explicitly stated in the vendor advisory, but the presence of fixed versions indicates an official fix is available.
CVE-2026-40324: CWE-674: Uncontrolled Recursion in ChilliCream graphql-platform
Description
CVE-2026-40324 is a critical vulnerability in the ChilliCream Hot Chocolate GraphQL server's recursive descent parser, Utf8GraphQLParser, present in versions prior to 12. 22. 7, 13. 9. 16, 14. 3. 1, and 15. 1. 14. The parser lacks a recursion depth limit, allowing crafted GraphQL documents with deeply nested structures to cause a StackOverflowException, which immediately terminates the worker process.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Hot Chocolate's Utf8GraphQLParser in affected versions has no recursion depth limit, enabling an attacker to craft deeply nested GraphQL queries that trigger a StackOverflowException in .NET, causing immediate termination of the worker process. This denial-of-service occurs before validation rules run, bypassing protections like MaxExecutionDepth and complexity analyzers. The vulnerability affects versions prior to 12.22.7, 13.9.16, 14.3.1, and 15.1.14. The patch adds a MaxAllowedRecursionDepth option to ParserOptions, enforcing recursion limits and replacing the uncatchable StackOverflowException with a catchable SyntaxException. No application-level workaround exists; only upgrading to patched versions mitigates the issue. Limiting HTTP request body size at the proxy can reduce but not eliminate risk.
Potential Impact
Exploitation causes a StackOverflowException that immediately terminates the worker process running the GraphQL server, resulting in denial of service. All ongoing HTTP requests, background hosted services, and WebSocket subscriptions on the affected worker are dropped. The orchestrator must restart the process, causing service disruption. There is no impact on confidentiality or data integrity. The vulnerability does not allow code execution or data leakage but causes availability loss.
Mitigation Recommendations
A fix is available in Hot Chocolate versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14 that introduces a recursion depth limit to prevent stack overflow crashes. Operators should upgrade to these patched versions to fully mitigate the vulnerability. There is no application-level workaround because StackOverflowException cannot be caught in .NET. Operators can reduce risk by limiting HTTP request body size at the reverse proxy or load balancer, but this is not sufficient to prevent all crashes due to the small size of triggering payloads. Patch status is not explicitly stated in the vendor advisory, but the presence of fixed versions indicates an official fix is available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-10T21:41:54.505Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e2c0dabdfbbecc599fc03e
Added to database: 4/17/2026, 11:23:06 PM
Last enriched: 4/17/2026, 11:38:22 PM
Last updated: 4/18/2026, 7:03:03 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.