{"api_version":"1","generated_at":"2026-04-14T14:30:53+00:00","cve":"CVE-2023-41317","urls":{"html":"https://cve.report/CVE-2023-41317","api":"https://cve.report/api/cve/CVE-2023-41317.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-41317","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-41317"},"summary":{"title":"CVE-2023-41317","description":"The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when GraphQL Subscriptions are enabled.  It can be triggered when **all of the following conditions are met**: 1. Running Apollo Router v1.28.0, v1.28.1 or v1.29.0 (\"impacted versions\"); **and** 2. The Supergraph schema provided to the Router (either via Apollo Uplink or explicitly via other configuration) **has a `subscription` type** with root-fields defined; **and** 3. The YAML configuration provided to the Router **has subscriptions enabled** (they are _disabled_ by default), either by setting `enabled: true` _or_ by setting a valid `mode` within the `subscriptions` object (as seen in [subscriptions' documentation](https://www.apollographql.com/docs/router/executing-operations/subscription-support/#router-setup)); **and** 4. An [anonymous](https://spec.graphql.org/draft/#sec-Anonymous-Operation-Definitions) (i.e., un-named) `subscription` operation (e.g., `subscription { ... }`) is received by the Router If **all four** of these criteria are met, the impacted versions will panic and terminate.  There is no data-privacy risk or sensitive-information exposure aspect to this vulnerability. This is fixed in Apollo Router v1.29.1. Users are advised to upgrade. Updating to v1.29.1 should be a clear and simple upgrade path for those running impacted versions.  However, if Subscriptions are **not** necessary for your Graph – but are enabled via configuration — then disabling subscriptions is another option to mitigate the risk.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-09-05 19:15:00","updated_at":"2023-09-08 16:49:00"},"problem_types":["CWE-755"],"metrics":[],"references":[{"url":"https://github.com/apollographql/router/commit/b295c103dd86c57c848397d32e8094edfa8502aa","name":"https://github.com/apollographql/router/commit/b295c103dd86c57c848397d32e8094edfa8502aa","refsource":"MISC","tags":[],"title":"Subscriptions: Correct v1.28.x regression allowing panic via un-named… · apollographql/router@b295c10 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx","name":"https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx","refsource":"MISC","tags":[],"title":"Unnamed \"Subscription\" operation results in Denial-of-Service in v1.28.0, v1.28.1 and v1.29.0 · Advisory · apollographql/router · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/apollographql/router/releases/tag/v1.29.1","name":"https://github.com/apollographql/router/releases/tag/v1.29.1","refsource":"MISC","tags":[],"title":"Release v1.29.1 · apollographql/router · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-41317","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41317","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"41317","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apollographql","cpe5":"apollo_router","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-41317","qid":"996201","title":"Rust (Rust) Security Update for apollo-router (GHSA-w8vq-3hf9-xppx)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-41317","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when GraphQL Subscriptions are enabled.  It can be triggered when **all of the following conditions are met**: 1. Running Apollo Router v1.28.0, v1.28.1 or v1.29.0 (\"impacted versions\"); **and** 2. The Supergraph schema provided to the Router (either via Apollo Uplink or explicitly via other configuration) **has a `subscription` type** with root-fields defined; **and** 3. The YAML configuration provided to the Router **has subscriptions enabled** (they are _disabled_ by default), either by setting `enabled: true` _or_ by setting a valid `mode` within the `subscriptions` object (as seen in [subscriptions' documentation](https://www.apollographql.com/docs/router/executing-operations/subscription-support/#router-setup)); **and** 4. An [anonymous](https://spec.graphql.org/draft/#sec-Anonymous-Operation-Definitions) (i.e., un-named) `subscription` operation (e.g., `subscription { ... }`) is received by the Router If **all four** of these criteria are met, the impacted versions will panic and terminate.  There is no data-privacy risk or sensitive-information exposure aspect to this vulnerability. This is fixed in Apollo Router v1.29.1. Users are advised to upgrade. Updating to v1.29.1 should be a clear and simple upgrade path for those running impacted versions.  However, if Subscriptions are **not** necessary for your Graph – but are enabled via configuration — then disabling subscriptions is another option to mitigate the risk."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-755: Improper Handling of Exceptional Conditions","cweId":"CWE-755"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"apollographql","product":{"product_data":[{"product_name":"router","version":{"version_data":[{"version_affected":"=","version_value":">= 1.28.0, < 1.29.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx","refsource":"MISC","name":"https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx"},{"url":"https://github.com/apollographql/router/commit/b295c103dd86c57c848397d32e8094edfa8502aa","refsource":"MISC","name":"https://github.com/apollographql/router/commit/b295c103dd86c57c848397d32e8094edfa8502aa"},{"url":"https://github.com/apollographql/router/releases/tag/v1.29.1","refsource":"MISC","name":"https://github.com/apollographql/router/releases/tag/v1.29.1"}]},"source":{"advisory":"GHSA-w8vq-3hf9-xppx","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-05 19:15:00","lastModifiedDate":"2023-09-08 16:49:00","problem_types":["CWE-755"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apollographql:apollo_router:*:*:*:*:*:*:*:*","versionStartIncluding":"1.28.0","versionEndExcluding":"1.29.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}