Vulnerability Description
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically due to internal optimizations being frequently bypassed. The query planner includes an optimization that significantly speeds up planning for applicable GraphQL selections. However, queries with deeply nested and reused named fragments can generate many selections where this optimization does not apply, leading to significantly longer planning times. Because the query planner does not enforce a timeout, a small number of such queries can exhaust router's thread pool, rendering it inoperable. This could lead to excessive resource consumption and denial of service. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/apollographql/router/commit/ab6675a63174715ea6ff50881fc957831
- https://github.com/apollographql/router/commit/bba032e183b861348a466d3123c7137a1
- https://github.com/apollographql/router/security/advisories/GHSA-94hh-jmq8-2fgp
FAQ
What is CVE-2025-32032?
CVE-2025-32032 is a vulnerability with a CVSS score of 7.5 (HIGH). The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router allowed queries wi...
How severe is CVE-2025-32032?
CVE-2025-32032 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-32032?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.