Vulnerability Description
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Prior to 1.61.2 and 2.1.1, a vulnerability in Apollo Router allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/apollographql/router/commit/ab6675a63174715ea6ff50881fc957831
- https://github.com/apollographql/router/commit/bba032e183b861348a466d3123c7137a1
- https://github.com/apollographql/router/security/advisories/GHSA-75m2-jhh5-j5g2
FAQ
What is CVE-2025-32034?
CVE-2025-32034 is a vulnerability with a CVSS score of 7.5 (HIGH). The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Prior to 1.61.2 and 2.1.1, a vulnerability in Apoll...
How severe is CVE-2025-32034?
CVE-2025-32034 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-32034?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.