CVE-2025-32032
Rust vulnerability analysis and mitigation

Overview

The Apollo Router Core, a high-performance graph router written in Rust for running federated supergraphs with Apollo Federation 2, was found to contain a critical vulnerability (CVE-2025-32032). The vulnerability was discovered on April 7, 2025, affecting versions prior to 1.61.2 and 2.1.1. The flaw allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically due to internal optimizations being frequently bypassed (NVD, GitHub Advisory).

Technical details

The vulnerability stems from the query planner's optimization mechanism. While the planner includes optimizations to speed up planning for applicable GraphQL selections, queries containing deeply nested and reused named fragments can generate many selections where these optimizations do not apply. The absence of a query planner timeout allows these queries to consume excessive resources. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating it can be exploited remotely without requiring privileges or user interaction (GitHub Advisory).

Impact

The exploitation of this vulnerability can lead to excessive resource consumption and denial of service. When exploited, a small number of specially crafted queries can exhaust the router's thread pool, effectively rendering it inoperable. This can significantly impact the availability of services relying on the Apollo Router (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in apollo-router versions 1.61.2 and 2.1.1. A new Query Optimization Limit metric has been implemented to approximate the number of selections that cannot be skipped by the existing optimization, which is checked against a limit to prevent excessive computation. For users unable to update immediately, the only known workaround is implementing 'Safelisting' or 'Safelisting with IDs only' as per Apollo GraphQL's documentation (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66627HIGH8.4
  • RustRust
  • wasmi
NoYesDec 09, 2025
GHSA-xrv8-2pf5-f3q7MEDIUM6
  • RustRust
  • nitro-tpm-pcr-compute
NoYesDec 05, 2025
CVE-2025-67487MEDIUM5.5
  • RustRust
  • static-web-server
NoYesDec 09, 2025
CVE-2025-66622LOW1.3
  • RustRust
  • matrix-sdk-base
NoYesDec 09, 2025
RUSTSEC-2025-0135N/AN/A
  • RustRust
  • matrix-sdk-base
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management