CVE-2024-43783
Rust vulnerability analysis and mitigation

Overview

The Apollo Router Core, a high-performance graph router written in Rust for federated supergraphs using Apollo Federation 2, contains a denial of service vulnerability (CVE-2024-43783) affecting versions >=1.7.0 and <1.52.1. The vulnerability manifests in two specific configurations: when using External Coprocessing with request body support enabled (versions >=1.21.0), or when using custom-developed Native Rust Plugins that access Request.router_request in the RouterService layer (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-770 (Allocation of Resources Without Limits or Throttling). When configured with affected settings, the Router loads entire HTTP request bodies into memory without respecting the configured limits.http_max_request_bytes configuration option. By default, the Router sets this limit to 2 MB. However, in vulnerable configurations, this limit can be exceeded, potentially leading to out-of-memory (OOM) termination if a sufficiently large request is sent to the Router (GitHub Advisory).

Impact

If exploited, this vulnerability can cause denial-of-service through out-of-memory (OOM) termination of the Router when processing sufficiently large requests. This affects systems where either External Coprocessing is configured to send request bodies or custom Native Rust Plugins are accessing request bodies in the RouterService layer (GitHub Advisory).

Mitigation and workarounds

Users should upgrade to Apollo Router version 1.52.1 or later which fixes the vulnerability. If immediate upgrade is not possible, there are several workarounds: 1) For External Coprocessors, set coprocessor.router.request.body configuration option to false, though this may impact coprocessor functionality. 2) For Native Rust Plugins, update the plugin to either not accumulate the request body or enforce a maximum body size limit. 3) Implement HTTP body payload size limits before requests reach the Router using a proxy or web application firewall (GitHub Advisory, Router Release).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22700HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22705MEDIUM6.4
  • RustRust
  • ml-dsa
NoYesJan 10, 2026
CVE-2025-15504MEDIUM4.8
  • PythonPython
  • lief
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management