๐Ÿ” CVE Alert

CVE-2026-41327

CRITICAL 9.1

Dgraph: Pre-Auth Full Database Exfiltration via DQL Injection in Upsert Condition Field

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack is a single HTTP POST to /mutate?commitNow=true containing a crafted cond field in an upsert mutation. The cond value is concatenated directly into a DQL query string via strings.Builder.WriteString after only a cosmetic strings.Replace transformation. No escaping, parameterization, or structural validation is applied. An attacker injects an additional DQL query block into the cond string, which the DQL parser accepts as a syntactically valid named query block. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.

CWE CWE-943
Vendor dgraph-io
Product dgraph
Published Apr 24, 2026
Last Updated Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for dgraph-io dgraph

Be the first to know when new critical vulnerabilities affecting dgraph-io dgraph are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

dgraph-io / dgraph
< 25.3.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/dgraph-io/dgraph/security/advisories/GHSA-mrxx-39g5-ph77 github.com: https://github.com/dgraph-io/dgraph/releases/tag/v25.3.3