Description
A vulnerability was identified in birkir prime up to 0.4.0.beta.0. This impacts an unknown function of the file /graphql of the component GraphQL Directive Handler. Such manipulation leads to information exposure through error message. The attack may be performed from remote. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-01-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Error Messages
Action: Update
AI Analysis

Impact

A flaw exists in the GraphQL Directive Handler of birkir prime up to version 0.4.0.beta.0, allowing an attacker to cause an error that leaks sensitive information through detailed error messages. The disclosure can compromise data confidentiality and compromise the integrity of the application. The vulnerability is listed as CWE-200 and CWE-209, but the description does not indicate any authentication or authorization bypass or arbitrary code execution.

Affected Systems

birkir prime, versions up to 0.4.0.beta.0. The affected component is the file /graphql within the GraphQL Directive Handler. Users who have deployed any release of birkir prime before 0.4.0.beta.1 or later are at risk; the scope includes all publicly exposed GraphQL endpoints.

Risk and Exploitability

The CVSS score of 6.9 marks it as a moderate to high severity flaw, and the EPSS score of less than 1% indicates low but non-zero exploitation probability. A publicly available exploit is documented, and the attack can be carried out remotely without prior authentication. The vulnerability is not listed in the CISA KEV catalog, but the publicly available exploitation materials and remote nature raise the risk for systems exposed to the internet.

Generated by OpenCVE AI on April 18, 2026 at 15:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether birkir has released a patch or updated version that addresses the GraphQL directive handler; consult the project’s GitHub issue tracker for any fixes or updates.
  • If no patch is available, restrict external access to the /graphql endpoint using firewall rules or HTTP Basic Auth to limit exposure to trusted users.
  • Configure the application to suppress detailed error information, returning generic error messages instead of exploitable content.

Generated by OpenCVE AI on April 18, 2026 at 15:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:birkir:prime:*:*:*:*:*:*:*:*

Mon, 26 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
References

Tue, 20 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Birkir
Birkir prime
Vendors & Products Birkir
Birkir prime

Mon, 19 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in birkir prime up to 0.4.0.beta.0. This impacts an unknown function of the file /graphql of the component GraphQL Directive Handler. Such manipulation leads to information exposure through error message. The attack may be performed from remote. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Title birkir prime GraphQL Directive graphql information exposure
Weaknesses CWE-200
CWE-209
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:49:09.909Z

Reserved: 2026-01-19T07:15:44.976Z

Link: CVE-2026-1175

cve-icon Vulnrichment

Updated: 2026-01-20T17:20:49.163Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T21:15:49.487

Modified: 2026-02-04T18:18:15.790

Link: CVE-2026-1175

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:00:04Z

Weaknesses