CVE-2025-27098
JavaScript vulnerability analysis and mitigation

Overview

GraphQL Mesh is a GraphQL Federation framework and gateway for both GraphQL Federation and non-GraphQL Federation subgraphs, non-GraphQL services, such as REST and gRPC, and also databases such as MongoDB, MySQL, and PostgreSQL. A missing check vulnerability was discovered in the static file handler that allows any client to access files in the server's file system. The vulnerability was disclosed on February 16, 2023, affecting versions >0.78.0 & <0.82.22 of @graphql-mesh/cli and versions <0.3.19 of @graphql-mesh/http (GitHub Advisory).

Technical details

The vulnerability occurs when staticFiles is set in the serve settings in the configuration file. The handler doesn't verify if the absolutePath is still under the directory provided as staticFiles. This allows path traversal attacks where attackers can access files outside the intended directory. For example, by setting staticFiles to './public' in .meshrc.yml and accessing paths like '/..%2fpackage.json', attackers can view the contents of files like package.json or even sensitive system files like /etc/passwd (GitHub Advisory).

Impact

The vulnerability allows unauthorized access to files outside the intended static files directory, potentially exposing sensitive system files and configuration data to attackers. This could lead to information disclosure and compromise of system security (GitHub Advisory).

Mitigation and workarounds

Users have two options to mitigate this vulnerability: 1) Update @graphql-mesh/cli to a version higher than 0.82.21, and if using @graphql-mesh/http, update it to a version higher than 0.3.18, or 2) Remove the staticFiles option from the configuration and use alternative solutions to serve static files (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65959HIGH8.7
  • JavaScriptJavaScript
  • open-webui
NoYesDec 04, 2025
CVE-2025-66032HIGH8.7
  • JavaScriptJavaScript
  • @anthropic-ai/claude-code
NoYesDec 03, 2025
CVE-2025-65945HIGH7.5
  • JavaScriptJavaScript
  • jws
NoYesDec 04, 2025
CVE-2025-66404MEDIUM6.4
  • JavaScriptJavaScript
  • mcp-server-kubernetes
NoYesDec 03, 2025
CVE-2025-66479LOW1.8
  • JavaScriptJavaScript
  • @anthropic-ai/sandbox-runtime
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management