Vulnerability Description
Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenticated. Unlike the similar restore mutation which requires Guardian-of-Galaxy authentication, restoreTenant executes with zero middleware. This mutation accepts attacker-controlled backup source URLs (including file:// for local filesystem access), S3/MinIO credentials, encryption key file paths, and Vault credential file paths. An unauthenticated attacker can overwrite the entire database, read server-side files, and perform SSRF. This vulnerability is fixed in 25.3.1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dgraph | Dgraph | <= 25.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/dgraph-io/dgraph/security/advisories/GHSA-p5rh-vmhp-gvcwExploitVendor Advisory
- https://github.com/dgraph-io/dgraph/security/advisories/GHSA-p5rh-vmhp-gvcwExploitVendor Advisory
FAQ
What is CVE-2026-34976?
CVE-2026-34976 is a vulnerability with a CVSS score of 10.0 (CRITICAL). Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenti...
How severe is CVE-2026-34976?
CVE-2026-34976 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-34976?
Check the references section above for vendor advisories and patch information. Affected products include: Dgraph Dgraph.