Cyber Posture

CVE-2026-28410

High

Published: 05 March 2026

Published
05 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0004 11.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28410 is a high-severity Improper Access Control (CWE-284) vulnerability in Thegraph Graph Protocol Contracts. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of flaws in token vesting contracts, directly enabling the patch to version 3.0.0 that fixes unauthorized token access.

prevent

Enforces approved authorizations in smart contracts to prevent low-privilege users from accessing locked tokens outside the vesting schedule, addressing CWE-284 improper access control.

detect

Employs vulnerability scanning to identify access control and calculation flaws like those in the vesting contracts prior to deployment or exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1657 Financial Theft Impact
Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims.
Why these techniques?

Public-facing smart contract flaw on blockchain networks is directly exploitable over the network (T1190); successful abuse enables premature/unauthorized withdrawal and drainage of locked tokens (T1657).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Graph is an indexing protocol for querying networks like Ethereum, IPFS, Polygon, and other blockchains. Prior to version 3.0.0, a flaw in the token vesting contracts allows users to access tokens that should still be locked according to their…

more

vesting schedule. This issue has been patched in version 3.0.0.

Deeper analysisAI

CVE-2026-28410 is a vulnerability in the token vesting contracts of The Graph, an indexing protocol used for querying blockchain networks such as Ethereum, IPFS, Polygon, and others. In versions prior to 3.0.0, the contracts contain a flaw that permits users to access tokens that are intended to remain locked according to their vesting schedule. This issue is classified under CWE-284 (Improper Access Control) and CWE-682 (Incorrect Calculation), with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to significant impacts on confidentiality and integrity.

The vulnerability can be exploited over the network by authenticated users with low privileges, requiring no user interaction or special complexity. Successful exploitation allows attackers to prematurely withdraw or access vested tokens that should be restricted, potentially leading to unauthorized token transfers or drainage of locked funds from vesting schedules.

The issue has been addressed in version 3.0.0 of the contracts. Official mitigation guidance is provided in the Graph Protocol's security advisory (GHSA-qx35-rc5x-x39r) and the patching commit (91224ed83eeff3fc3afea01f5ed269373d9bf773) on GitHub, recommending an upgrade to the fixed version.

Details

CWE(s)

Affected Products

thegraph
graph protocol contracts
≤ 3.0.0

CVEs Like This One

CVE-2025-66956Shared CWE-284
CVE-2026-30707Shared CWE-284
CVE-2025-23243Shared CWE-284
CVE-2026-40595Shared CWE-284
CVE-2025-66509Shared CWE-284
CVE-2025-27649Shared CWE-284
CVE-2025-50900Shared CWE-284
CVE-2025-50105Shared CWE-284
CVE-2025-29515Shared CWE-284
CVE-2026-34287Shared CWE-284

References