CVE-2025-32034
Rust vulnerability analysis and mitigation

Overview

The Apollo Router Core, a configurable high-performance graph router written in Rust for running federated supergraphs with Apollo Federation 2, contained a vulnerability prior to versions 1.61.2 and 2.1.1. The vulnerability allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion (GitHub Advisory, NVD).

Technical details

Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. The vulnerability was assigned a CVSS v3.1 base score of 7.5 (High) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The issue was classified as CWE-770: Allocation of Resources Without Limits or Throttling (NVD).

Impact

The vulnerability could lead to excessive resource consumption and denial of service. When exploited, the issue could render the router inoperable through uncontrolled resource consumption. All prior-released versions and configurations were vulnerable except those where persistedqueries.enabled, persistedqueries.safelist.enabled, and persistedqueries.safelist.requireid were all set to true (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in apollo-router versions 1.61.2 and 2.1.1. A new Query Fragment Expansion Limit metric was introduced to compute the number of selections a query would have if its fragment spreads were fully expanded, which is checked against a limit to prevent excessive computation. The only known workaround for unpatched versions is implementing 'Safelisting' or 'Safelisting with IDs only' using Persisted Queries (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-2fjw-whxm-9v4qCRITICAL9.3
  • RustRust
  • nftnl
NoYesNov 25, 2025
CVE-2025-66017HIGH8.2
  • RustRust
  • cggmp21
NoYesNov 25, 2025
GHSA-mj73-j457-8x9qLOW2.7
  • RustRust
  • maxminddb
NoYesDec 02, 2025
GHSA-pq5v-rwp8-p7gmLOW2.7
  • RustRust
  • rtvm-interpreter
NoNoDec 02, 2025
RUSTSEC-2025-0132N/AN/A
  • RustRust
  • maxminddb
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management