Impact
GraphQL Modules 2.x and 3.x exhibit a race condition when multiple parallel requests trigger the same service with @ExecutionContext injection. The context information, typically containing authentication tokens or per‑request data, can become mixed between requests, allowing one request to access another’s sensitive data or privileges. This flaw is a classic CWE‑362 (Race Condition) that can result in unauthorized access or data leakage.
Affected Systems
The vulnerability affects graphql-hive:graphql-modules versions 2.2.1 through 2.4.0 and any release prior to 3.1.1. Versions 2.4.1 and 3.1.1 onward contain the fixed implementation.
Risk and Exploitability
The CVSS score of 8.7 classifies this as high impact. The EPSS score of less than 1% indicates a low exploitation probability at present, and the CVE is not listed in CISA’s KEV catalog. Attackers would need to send concurrent GraphQL requests to a server that imports graphql-modules and uses @ExecutionContext to propagate authentication; no local privilege escalation is required.
OpenCVE Enrichment
Github GHSA