Description
A vulnerability was found in birkir prime up to 0.4.0.beta.0. The impacted element is an unknown function of the file /graphql of the component GraphQL Array Based Query Batch Handler. The manipulation results in denial of service. The attack can be executed remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-01-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A flaw in the unknown function of birkir prime’s GraphQL Array Based Query Batch handler in the /graphql component allows an attacker to trigger a denial of service by manipulating query requests. The vulnerability is exploitable remotely and a public exploit has been disclosed, enabling attackers to inject crafted queries that cause the server to consume excessive resources and become unresponsive. The primary impact is the loss of service availability for users interfacing with the GraphQL API.

Affected Systems

The vulnerability affects the birkir prime application, specifically versions up to and including 0.4.0.beta.0. No other versions were identified as affected. The product is distributed under the birkir:prime package name and resides in the GraphQL module of the codebase.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium‑to‑high severity, while the EPSS score of less than 1% reflects a low probability of widespread exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog, and the exploit requires remote access to the GraphQL endpoint. If an attacker can craft large or repeated batch queries, the server’s resources can be exhausted, leading to service interruption or crashes. The impact is limited to availability, with no known effects on confidentiality or integrity. The attack vector is inferred to be remote HTTP traffic to the GraphQL endpoint, as the description specifies that the attack can be executed remotely.

Generated by OpenCVE AI on April 18, 2026 at 05:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update birkir prime to the newest release that addresses the GraphQL Array Based Query Batch flaw, or obtain a patch from the project maintainer.
  • Configure application‑level rate limiting or size restrictions on GraphQL requests to prevent excessively large or numerous batch queries from exhausting server resources.
  • If a patch or limit cannot be applied, disable or remove the Array Based Query Batch handler or restrict access to the GraphQL endpoint entirely until the issue is resolved.

Generated by OpenCVE AI on April 18, 2026 at 05:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
References

Wed, 04 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:birkir:prime:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Birkir
Birkir prime
Vendors & Products Birkir
Birkir prime

Mon, 19 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in birkir prime up to 0.4.0.beta.0. The impacted element is an unknown function of the file /graphql of the component GraphQL Array Based Query Batch Handler. The manipulation results in denial of service. The attack can be executed remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
Title birkir prime GraphQL Array Based Query Batch graphql denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:48:43.290Z

Reserved: 2026-01-19T07:15:39.300Z

Link: CVE-2026-1173

cve-icon Vulnrichment

Updated: 2026-01-20T14:50:31.888Z

cve-icon NVD

Status : Modified

Published: 2026-01-19T20:15:48.760

Modified: 2026-02-23T09:16:49.477

Link: CVE-2026-1173

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:15:15Z

Weaknesses