CVE-2025-32380: Apollo Router Query Validation Vulnerable to Excessive Resource Consumption via Named Fragment Processing

7.5 CVSS

Description

The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router's usage of Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. This could lead to excessive resource consumption and denial of service. Apollo Router's usage of Apollo Compiler has been updated so that validation logic processes each named fragment only once, preventing redundant traversal. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.

Classification

CVE ID: CVE-2025-32380

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem Types

CWE-770: Allocation of Resources Without Limits or Throttling

Affected Products

Vendor: apollographql

Product: router

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 15.29% (scored less or equal to compared to others)

EPSS Date: 2025-04-21 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32380
https://github.com/apollographql/router/security/advisories/GHSA-3j43-9v8v-cp3f
https://github.com/apollographql/router/commit/ab6675a63174715ea6ff50881fc957831d4e9564
https://github.com/apollographql/router/commit/bba032e183b861348a466d3123c7137a1ae18952

Timeline