Wiz Agents & Workflows are here
Vulnerability DatabaseGHSA-w42g-7vfc-xf37

GHSA-w42g-7vfc-xf37
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-w42g-7vfc-xf37) affects Apollo Server's schema validation rules implementation, specifically in versions prior to 2.14.2. The issue was discovered by the Bitwala team and disclosed on June 4, 2020. The vulnerability impacts multiple Apollo Server packages including apollo-server-core and its integration packages (apollo-server-express, apollo-server-lambda, apollo-server-koa, etc.) when using WebSocket subscriptions (GitHub Advisory).

Technical details

The vulnerability stems from validation rules not being properly passed to the SubscriptionServer.create invocation in the WebSocket subscriptions transport. This affects both user-provided validation rules and the internal NoIntrospection validation rule. The issue only manifests when subscriptions are enabled (which is the default behavior) and introspection is disabled. When these conditions are met, it becomes possible to perform introspection queries through the WebSocket endpoint even when introspection is explicitly disabled for other transports like HTTP (GitHub Advisory).

Impact

The severity of the vulnerability is rated as Moderate. The impact varies depending on whether sensitive information is stored in the schema itself. Schema descriptions, type names, or field names that might contain sensitive information could be exposed through introspection queries via the WebSocket endpoint, even when introspection is disabled. Additionally, any custom validation rules set by implementors would not be enforced on the subscriptions endpoint (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Apollo Server version 2.14.2 or higher. For those unable to upgrade immediately, a workaround is available by disabling subscriptions entirely using the subscriptions: false option in the ApolloServer constructor. When upgrading, it's important to ensure that both the affected integration package and the apollo-server-core package are updated to version 2.14.2 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-34156CRITICAL9.9
  • JavaScriptJavaScript
  • @nocobase/plugin-workflow-javascript
NoYesMar 30, 2026
CVE-2026-34363HIGH8.2
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026
CVE-2026-33949HIGH8.1
  • JavaScriptJavaScript
  • @tinacms/graphql
NoYesMar 30, 2026
CVE-2026-34043MEDIUM5.9
  • JavaScriptJavaScript
  • serialize-javascript
NoYesMar 31, 2026
CVE-2026-34373MEDIUM5.3
  • JavaScriptJavaScript
  • parse-server
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management