
Cloud Vulnerability DB
A community-led vulnerabilities database
Apollo Studio Embeddable Explorer & Embeddable Sandbox, website embeddable software solutions from Apollo GraphQL, were found to contain a Cross-Site Request Forgery (CSRF) vulnerability prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3. The vulnerability was discovered on September 25, 2025, affecting the client-side code that handles window.postMessage events (GitHub Advisory, NVD).
The vulnerability stems from missing origin validation in the client-side code that handles window.postMessage events. The issue has been assigned a CVSS v3.1 base score of 8.2 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N. The vulnerability is classified under two CWE categories: CWE-346 (Origin Validation Error) and CWE-352 (Cross-Site Request Forgery) (GitHub Advisory).
A malicious website can exploit this vulnerability to send forged messages to the embedding page, causing the victim's browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim's cookies. While attackers cannot read the responses to the GraphQL operations, they can execute mutations with side effects. The operations contain the browser user's cookies and can target vulnerable websites on private networks otherwise inaccessible to the attacker (GitHub Advisory).
The vulnerability has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3 by adding strict origin validation to DOM message handling. Apollo's CDN embeds have been automatically updated to the patched versions. For Apollo Server users, setting NODE_ENV=production in production environments prevents unintentional serving of embedded Sandbox. Users not directly installing the npm packages @apollo/sandbox or @apollo/explorer do not need to take action as the vulnerability has already been mitigated through CDN updates (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."