Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack is a single HTTP POST to /mutate?commitNow=true containing a crafted cond field in an upsert mutation. The cond value is concatenated directly into a DQL query string via strings.Builder.WriteString after only a cosmetic strings.Replace transformation. No escaping, parameterization, or structural validation is applied. An attacker injects an additional DQL query block into the cond string, which the DQL parser accepts as a syntactically valid named query block. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.
References
| Link | Resource |
|---|---|
| https://github.com/dgraph-io/dgraph/releases/tag/v25.3.3 | Release Notes |
| https://github.com/dgraph-io/dgraph/security/advisories/GHSA-mrxx-39g5-ph77 | Exploit Mitigation Vendor Advisory |
| https://github.com/dgraph-io/dgraph/security/advisories/GHSA-mrxx-39g5-ph77 | Exploit Mitigation Vendor Advisory |
Configurations
History
28 Apr 2026, 18:31
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Dgraph
Dgraph dgraph |
|
| CPE | cpe:2.3:a:dgraph:dgraph:*:*:*:*:*:go:*:* | |
| References | () https://github.com/dgraph-io/dgraph/releases/tag/v25.3.3 - Release Notes | |
| References | () https://github.com/dgraph-io/dgraph/security/advisories/GHSA-mrxx-39g5-ph77 - Exploit, Mitigation, Vendor Advisory |
24 Apr 2026, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-24 19:17
Updated : 2026-04-28 18:31
NVD link : CVE-2026-41327
Mitre link : CVE-2026-41327
CVE.ORG link : CVE-2026-41327
JSON object : View
Products Affected
dgraph
- dgraph
CWE
CWE-943
Improper Neutralization of Special Elements in Data Query Logic
