{"api_version":"1","generated_at":"2026-05-09T00:35:51+00:00","cve":"CVE-2026-42793","urls":{"html":"https://cve.report/CVE-2026-42793","api":"https://cve.report/api/cve/CVE-2026-42793.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42793","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42793"},"summary":{"title":"Atom table exhaustion via attacker-controlled GraphQL SDL names in absinthe","description":"Allocation of Resources Without Limits or Throttling vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via atom table exhaustion when parsing attacker-controlled GraphQL SDL.\n\nMultiple Blueprint.Draft.convert/2 implementations in Absinthe's SDL language modules call String.to_atom/1 on attacker-controlled names from parsed GraphQL SDL documents, including directive names, field names, type names, and argument names. Because atoms are never garbage-collected and the BEAM atom table has a fixed limit (default 1,048,576), each unique name permanently consumes one slot. An attacker can exhaust the atom table by submitting SDL documents containing enough unique names, causing the Erlang VM to abort with system_limit and taking down the entire node.\n\nAny application that passes attacker-controlled GraphQL SDL through Absinthe's parser is exposed — for example, a schema-upload endpoint, a federation gateway that ingests remote SDL, or any developer tool that runs the parser over user-supplied documents.\n\nThis issue affects absinthe: from 1.5.0 before 1.10.2.","state":"PUBLISHED","assigner":"EEF","published_at":"2026-05-08 16:16:12","updated_at":"2026-05-08 16:16:12"},"problem_types":["CWE-770","CWE-770 CWE-770 Allocation of Resources Without Limits or Throttling"],"metrics":[{"version":"4.0","source":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","type":"Secondary","score":"8.2","severity":"HIGH","vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"CVSS","score":"8.2","severity":"HIGH","vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","data":{"attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":8.2,"baseSeverity":"HIGH","privilegesRequired":"NONE","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE"}}],"references":[{"url":"https://osv.dev/vulnerability/EEF-CVE-2026-42793","name":"https://osv.dev/vulnerability/EEF-CVE-2026-42793","refsource":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/absinthe-graphql/absinthe/security/advisories/GHSA-qf4g-9fqq-mmm7","name":"https://github.com/absinthe-graphql/absinthe/security/advisories/GHSA-qf4g-9fqq-mmm7","refsource":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cna.erlef.org/cves/CVE-2026-42793.html","name":"https://cna.erlef.org/cves/CVE-2026-42793.html","refsource":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42793","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42793","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"absinthe-graphql","product":"absinthe","version":"affected 1.5.0 1.10.2 semver","platforms":[]},{"source":"CNA","vendor":"absinthe-graphql","product":"absinthe","version":"affected d0eae7764520d4e8e5dfff619068c0de911aec33 dd842b938e3823f345c10416914ffab5d5536838 git","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Peter Ullrich","lang":"en"},{"source":"CNA","value":"Curtis Schiewek","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-42793","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-05-08T16:09:01.643983Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-05-08T16:09:11.643Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"collectionURL":"https://repo.hex.pm","cpes":["cpe:2.3:a:absinthe-graphql:absinthe:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["'Elixir.Absinthe.Language.DirectiveDefinition'","'Elixir.Absinthe.Language.EnumTypeDefinition'","'Elixir.Absinthe.Language.FieldDefinition'","'Elixir.Absinthe.Language.InputObjectTypeDefinition'","'Elixir.Absinthe.Language.InputValueDefinition'","'Elixir.Absinthe.Language.InterfaceTypeDefinition'","'Elixir.Absinthe.Language.ObjectTypeDefinition'","'Elixir.Absinthe.Language.ScalarTypeDefinition'","'Elixir.Absinthe.Language.UnionTypeDefinition'"],"packageName":"absinthe","packageURL":"pkg:hex/absinthe","product":"absinthe","programFiles":["lib/absinthe/language/directive_definition.ex","lib/absinthe/language/enum_type_definition.ex","lib/absinthe/language/field_definition.ex","lib/absinthe/language/input_object_type_definition.ex","lib/absinthe/language/input_value_definition.ex","lib/absinthe/language/interface_type_definition.ex","lib/absinthe/language/object_type_definition.ex","lib/absinthe/language/scalar_type_definition.ex","lib/absinthe/language/union_type_definition.ex"],"programRoutines":[{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.DirectiveDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.EnumTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.FieldDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.InputObjectTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.InputValueDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.InterfaceTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.ObjectTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.ScalarTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.UnionTypeDefinition':convert/2"}],"repo":"https://github.com/absinthe-graphql/absinthe","vendor":"absinthe-graphql","versions":[{"lessThan":"1.10.2","status":"affected","version":"1.5.0","versionType":"semver"}]},{"collectionURL":"https://github.com","cpes":["cpe:2.3:a:absinthe-graphql:absinthe:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","modules":["'Elixir.Absinthe.Language.DirectiveDefinition'","'Elixir.Absinthe.Language.EnumTypeDefinition'","'Elixir.Absinthe.Language.FieldDefinition'","'Elixir.Absinthe.Language.InputObjectTypeDefinition'","'Elixir.Absinthe.Language.InputValueDefinition'","'Elixir.Absinthe.Language.InterfaceTypeDefinition'","'Elixir.Absinthe.Language.ObjectTypeDefinition'","'Elixir.Absinthe.Language.ScalarTypeDefinition'","'Elixir.Absinthe.Language.UnionTypeDefinition'"],"packageName":"absinthe-graphql/absinthe","packageURL":"pkg:github/absinthe-graphql/absinthe","product":"absinthe","programFiles":["lib/absinthe/language/directive_definition.ex","lib/absinthe/language/enum_type_definition.ex","lib/absinthe/language/field_definition.ex","lib/absinthe/language/input_object_type_definition.ex","lib/absinthe/language/input_value_definition.ex","lib/absinthe/language/interface_type_definition.ex","lib/absinthe/language/object_type_definition.ex","lib/absinthe/language/scalar_type_definition.ex","lib/absinthe/language/union_type_definition.ex"],"programRoutines":[{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.DirectiveDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.EnumTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.FieldDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.InputObjectTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.InputValueDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.InterfaceTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.ObjectTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.ScalarTypeDefinition':convert/2"},{"name":"'Elixir.Absinthe.Blueprint.Draft.Absinthe.Language.UnionTypeDefinition':convert/2"}],"repo":"https://github.com/absinthe-graphql/absinthe","vendor":"absinthe-graphql","versions":[{"lessThan":"dd842b938e3823f345c10416914ffab5d5536838","status":"affected","version":"d0eae7764520d4e8e5dfff619068c0de911aec33","versionType":"git"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:absinthe-graphql:absinthe:*:*:*:*:*:*:*:*","versionEndExcluding":"1.10.2","versionStartIncluding":"1.5.0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"AND"}],"credits":[{"lang":"en","type":"finder","value":"Peter Ullrich"},{"lang":"en","type":"remediation developer","value":"Curtis Schiewek"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Allocation of Resources Without Limits or Throttling vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via atom table exhaustion when parsing attacker-controlled GraphQL SDL.<p>Multiple <tt>Blueprint.Draft.convert/2</tt> implementations in Absinthe's SDL language modules call <tt>String.to_atom/1</tt> on attacker-controlled names from parsed GraphQL SDL documents, including directive names, field names, type names, and argument names. Because atoms are never garbage-collected and the BEAM atom table has a fixed limit (default 1,048,576), each unique name permanently consumes one slot. An attacker can exhaust the atom table by submitting SDL documents containing enough unique names, causing the Erlang VM to abort with <tt>system_limit</tt> and taking down the entire node.</p><p>Any application that passes attacker-controlled GraphQL SDL through Absinthe's parser is exposed — for example, a schema-upload endpoint, a federation gateway that ingests remote SDL, or any developer tool that runs the parser over user-supplied documents.</p><p>This issue affects absinthe: from 1.5.0 before 1.10.2.</p>"}],"value":"Allocation of Resources Without Limits or Throttling vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via atom table exhaustion when parsing attacker-controlled GraphQL SDL.\n\nMultiple Blueprint.Draft.convert/2 implementations in Absinthe's SDL language modules call String.to_atom/1 on attacker-controlled names from parsed GraphQL SDL documents, including directive names, field names, type names, and argument names. Because atoms are never garbage-collected and the BEAM atom table has a fixed limit (default 1,048,576), each unique name permanently consumes one slot. An attacker can exhaust the atom table by submitting SDL documents containing enough unique names, causing the Erlang VM to abort with system_limit and taking down the entire node.\n\nAny application that passes attacker-controlled GraphQL SDL through Absinthe's parser is exposed — for example, a schema-upload endpoint, a federation gateway that ingests remote SDL, or any developer tool that runs the parser over user-supplied documents.\n\nThis issue affects absinthe: from 1.5.0 before 1.10.2."}],"impacts":[{"capecId":"CAPEC-130","descriptions":[{"lang":"en","value":"CAPEC-130 Excessive Allocation"}]}],"metrics":[{"cvssV4_0":{"attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":8.2,"baseSeverity":"HIGH","privilegesRequired":"NONE","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-770","description":"CWE-770 Allocation of Resources Without Limits or Throttling","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-08T15:42:46.101Z","orgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","shortName":"EEF"},"references":[{"tags":["vendor-advisory","related"],"url":"https://github.com/absinthe-graphql/absinthe/security/advisories/GHSA-qf4g-9fqq-mmm7"},{"tags":["related"],"url":"https://cna.erlef.org/cves/CVE-2026-42793.html"},{"tags":["related"],"url":"https://osv.dev/vulnerability/EEF-CVE-2026-42793"}],"source":{"discovery":"EXTERNAL"},"title":"Atom table exhaustion via attacker-controlled GraphQL SDL names in absinthe","x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","assignerShortName":"EEF","cveId":"CVE-2026-42793","datePublished":"2026-05-08T15:42:46.101Z","dateReserved":"2026-04-29T18:06:33.251Z","dateUpdated":"2026-05-08T16:09:11.643Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 16:16:12","lastModifiedDate":"2026-05-08 16:16:12","problem_types":["CWE-770","CWE-770 CWE-770 Allocation of Resources Without Limits or Throttling"],"metrics":{"cvssMetricV40":[{"source":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42793","Ordinal":"1","Title":"Atom table exhaustion via attacker-controlled GraphQL SDL names ","CVE":"CVE-2026-42793","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42793","Ordinal":"1","NoteData":"Allocation of Resources Without Limits or Throttling vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via atom table exhaustion when parsing attacker-controlled GraphQL SDL.\n\nMultiple Blueprint.Draft.convert/2 implementations in Absinthe's SDL language modules call String.to_atom/1 on attacker-controlled names from parsed GraphQL SDL documents, including directive names, field names, type names, and argument names. Because atoms are never garbage-collected and the BEAM atom table has a fixed limit (default 1,048,576), each unique name permanently consumes one slot. An attacker can exhaust the atom table by submitting SDL documents containing enough unique names, causing the Erlang VM to abort with system_limit and taking down the entire node.\n\nAny application that passes attacker-controlled GraphQL SDL through Absinthe's parser is exposed — for example, a schema-upload endpoint, a federation gateway that ingests remote SDL, or any developer tool that runs the parser over user-supplied documents.\n\nThis issue affects absinthe: from 1.5.0 before 1.10.2.","Type":"Description","Title":"Atom table exhaustion via attacker-controlled GraphQL SDL names "}]}}}