CVE-2025-32032: Apollo Router Query Planner Vulnerable to Excessive Resource Consumption via Optimization Bypass

7.5 CVSS

Description

The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically due to internal optimizations being frequently bypassed. The query planner includes an optimization that significantly speeds up planning for applicable GraphQL selections. However, queries with deeply nested and reused named fragments can generate many selections where this optimization does not apply, leading to significantly longer planning times. Because the query planner does not enforce a timeout, a small number of such queries can exhaust router's thread pool, rendering it inoperable. This could lead to excessive resource consumption and denial of service. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.

Classification

CVE ID: CVE-2025-32032

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem Types

CWE-770: Allocation of Resources Without Limits or Throttling

Affected Products

Vendor: apollographql

Product: router

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 15.28% (scored less or equal to compared to others)

EPSS Date: 2025-04-22 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32032
https://github.com/apollographql/router/security/advisories/GHSA-94hh-jmq8-2fgp
https://github.com/apollographql/router/commit/ab6675a63174715ea6ff50881fc957831d4e9564
https://github.com/apollographql/router/commit/bba032e183b861348a466d3123c7137a1ae18952

Timeline