CVE-2026-32621: Apollo Federation
CVE-2026-32621
Critical Apollo Gateway prototype pollution lets attackers crash services or execute remote code. Update to version 2.9.6, 2.10.5, 2.11.6, 2.12.3, or 2.13.2 now.
Patch now - CVE-2026-32621 is a critical prototype pollution in Apollo Gateway versions before 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2 that lets attackers crash the gateway, alter application behavior, or execute remote code with a CVSS 9.9 severity. Update to the patched versions immediately.
Overview
A critical security vulnerability, identified as CVE-2026-32621, has been discovered in Apollo Federation, a popular architecture for building a unified GraphQL API from multiple subgraphs. This flaw resides in the query plan execution logic of the Apollo Gateway. If exploited, it allows an attacker to pollute the base Object.prototype in the gateway’s JavaScript environment, which can lead to severe consequences including denial of service, unexpected application behavior, or potentially remote code execution.
Vulnerability Details
The vulnerability is a form of prototype pollution. In simple terms, it allows an attacker to inject properties into fundamental JavaScript objects that are inherited by all other objects. This can corrupt the application’s logic and state.
Exploitation can occur through two primary vectors:
- Direct Client Attack: A malicious client can send a specially crafted GraphQL operation (query or mutation) containing field aliases or variable names designed to target inheritable properties on the
Object.prototype. - Compromised Subgraph Attack: If a federated subgraph is compromised, a malicious actor controlling that subgraph can craft JSON response payloads that, when processed by the gateway, achieve the same prototype pollution effect.
Impact
With a CVSS score of 9.9 (CRITICAL), this vulnerability poses a significant risk. Successful exploitation could allow an attacker to:
- Crash the Apollo Gateway, causing a denial of service for your entire GraphQL API.
- Alter the application’s behavior in unpredictable ways, potentially bypassing security controls or business logic.
- In worst-case scenarios, prototype pollution can be a stepping stone to remote code execution, granting the attacker control over the gateway server.
This flaw highlights how a breach in one subgraph can threaten the integrity of the entire federated graph, similar to risks seen in other ecosystems where a single compromised component can have widespread effects, as seen in recent iOS exploit chains.
Remediation and Mitigation
The only complete remediation is to update the Apollo Gateway to a patched version.
Immediate Action Required: Update your Apollo Gateway to one of the following secure versions:
- Version 2.9.6
- Version 2.10.5
- Version 2.11.6
- Version 2.12.3
- Version 2.13.2
Mitigation Steps (If Immediate Patching is Not Possible):
- Review Subgraph Security: Strictly audit and monitor the security of all subgraphs in your federation. Treat each as a potential attack vector into the gateway.
- Input Validation: Implement rigorous input validation and sanitization at the gateway level for incoming GraphQL operations. However, this is a complex mitigation and not a substitute for patching.
- Network Controls: Restrict access to the GraphQL gateway endpoint as much as possible using network firewalls or API gateways.
Organizations should treat this update with the highest priority, akin to the urgency of critical platform patches. Apply the update in your development and testing environments first, then proceed to production following your standard change management procedures.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-32621?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
WordPress TheCartPress 1.5.3.6 contains an unauthenticated privilege escalation vulnerability that allows attackers to create administrator accounts by submitting crafted requests to the AJAX handler....
WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers ...
OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments. Atta...
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global ma...