Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2.

Project Subscriptions

Vendors Products
Apollographql Subscribe
Federation-internals Subscribe
Gateway Subscribe
Query-planner Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pfjj-6f4p-rvmh Apollo Federation vulnerable to prototype pollution via incomplete key sanitization
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Apollographql
Apollographql federation-internals
Apollographql gateway
Apollographql query-planner
Vendors & Products Apollographql
Apollographql federation-internals
Apollographql gateway
Apollographql query-planner

Fri, 13 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2.
Title Apollo Federation has prototype pollution via incomplete key sanitization
Weaknesses CWE-1321
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T20:14:57.335Z

Reserved: 2026-03-12T15:29:36.557Z

Link: CVE-2026-32621

cve-icon Vulnrichment

Updated: 2026-03-16T20:14:41.352Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:39.797

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-32621

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-16T09:23:53Z

Weaknesses