Description

Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2.

INFO

Published Date :

2026-03-13T20:29:54.875Z

Last Modified :

2026-03-16T20:14:57.335Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-32621 vulnerability.

Vendors Products
Apollographql
  • Federation-internals
  • Gateway
  • Query-planner
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32621.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact