Vulnerability Description
Apollo Server is an open-source, spec-compliant GraphQL server that's compatible with any GraphQL client, including Apollo Client. In versions from 2.0.0 to 3.13.0, 4.2.0 to before 4.13.0, and 5.0.0 to before 5.4.0, the default configuration of startStandaloneServer from @apollo/server/standalone is vulnerable to denial of service (DoS) attacks through specially crafted request bodies with exotic character set encodings. This issue does not affect users that use @apollo/server as a dependency for integration packages, like @as-integrations/express5 or @as-integrations/next, only direct usage of startStandaloneServer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apollographql | Apollo Server | >= 2.0.0, <= 3.13.0 |
Related Weaknesses (CWE)
References
- https://github.com/apollographql/apollo-server/commit/d25a5bdc377826ad424fcf7f8dPatch
- https://github.com/apollographql/apollo-server/commit/e9d49d163a86b8a33be56ed27cPatch
- https://github.com/apollographql/apollo-server/security/advisories/GHSA-mp6q-xf9MitigationVendor Advisory
FAQ
What is CVE-2026-23897?
CVE-2026-23897 is a vulnerability with a CVSS score of 7.5 (HIGH). Apollo Server is an open-source, spec-compliant GraphQL server that's compatible with any GraphQL client, including Apollo Client. In versions from 2.0.0 to 3.13.0, 4.2.0 to before 4.13.0, and 5.0.0 t...
How severe is CVE-2026-23897?
CVE-2026-23897 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23897?
Check the references section above for vendor advisories and patch information. Affected products include: Apollographql Apollo Server.