CVE-2026-43967
Quadratic fragment-name uniqueness check causes denial of service in absinthe
Inefficient Algorithmic Complexity vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via quadratic fragment-name uniqueness validation. 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames':run/2 iterates over all fragments and for each one calls duplicate?/2, which evaluates Enum.count(fragments, &(&1.name == name)) โ a full linear scan of the fragment list. The result is O(Nยฒ) comparisons per document, where N is the number of fragment definitions supplied by the caller. Because input.fragments is built directly from the GraphQL query body, N is fully attacker-controlled. A minimum-size fragment definition is roughly 16 bytes, so a ~1 MB document carries ~60,000 fragments and forces ~3.6 ร 10โน comparisons inside this single validation phase. No authentication, schema knowledge, or special configuration is required. This issue affects absinthe: from 1.2.0 before 1.10.2.
| CWE | CWE-407 |
| Vendor | absinthe-graphql |
| Product | absinthe |
| Published | May 8, 2026 |
| Last Updated | May 8, 2026 |
Get instant alerts for absinthe-graphql absinthe
Be the first to know when new unknown vulnerabilities affecting absinthe-graphql absinthe are published โ delivered to Slack, Telegram or Discord.