Impact
Apollo Server, a popular GraphQL server, suffers from a denial‑of‑service vulnerability when the default startStandaloneServer configuration is used. Attackers can craft request bodies employing exotic character‑set encodings to exhaust server resources. The weakness is identified as CWE‑1333, reflecting unvalidated, bizarre input that triggers abnormal processing.
Affected Systems
The vulnerability affects Apollo Server packages from multiple major releases: versions 2.0.0 through 3.13.0, 4.2.0 through 4.12.x, and 5.0.0 through 5.3.x. Direct usage of startStandaloneServer in these ranges is impacted; integration of Apollo Server via wrappers such as @as‑integrations/express5 or @as‑integrations/next is not affected.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity with moderate complexity for exploit. The EPSS score of less than 1% suggests that the likelihood of publicly available exploitation is currently low, and the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, an attacker who can send crafted request bodies to a publicly exposed GraphQL endpoint running an affected version can cause resource exhaustion, leading to service downtime. The attack vector is inferred to be remote and network‑based, requiring no local privileges.
OpenCVE Enrichment
Github GHSA