CVE-2025-32033
HIGHCrates.io Apollo-router < 1.61.2 - Memory Corruption
Title source: ruleDescription
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Prior to 1.61.2 and 2.1.1, the operation limits plugin uses unsigned 32-bit integers to track limit counters (e.g. for a query's height). If a counter exceeded the maximum value for this data type (4,294,967,295), it wrapped around to 0, unintentionally allowing queries to bypass configured thresholds. This could occur for large queries if the payload limit were sufficiently increased, but could also occur for small queries with deeply nested and reused named fragments. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/apollographql/router/security/advisories/GHSA-84m6-5m72-45fp
Patch x_refsource_misc
https://github.com/apollographql/router/commit/ab6675a63174715ea6ff50881fc957831d4e9564
Scores
CVSS v3
7.5
EPSS
0.0038
EPSS Percentile
59.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-119
Status
published
Products (3)
apollographql/router
< 1.61.2
apollographql/router
>= 2.0.0-alpha.0, < 2.1.1
crates.io/apollo-router
0 - 1.61.2crates.io
Published
Apr 07, 2025
Tracked Since
Feb 18, 2026