Cyber Posture

CVE-2026-41328

CriticalPublic PoC

Published: 24 April 2026

Published
24 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0016 37.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41328 is a critical-severity Improper Neutralization of Special Elements in Data Query Logic (CWE-943) vulnerability in Dgraph Dgraph. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations, preventing unauthenticated access to /alter and /mutate endpoints required for the exploit.

prevent

Validates inputs like the unsanitized pred.Lang field extracted from JSON keys, directly blocking the DQL injection payload.

prevent

Requires timely identification, reporting, and correction of flaws like the addQueryIfUnique injection vulnerability fixed in version 25.3.3.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

The vulnerability allows unauthenticated exploitation of a public-facing GraphQL database (T1190) via DQL injection, enabling arbitrary data queries and full read access from the database (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where…

more

ACL is not enabled. The attack requires two HTTP POSTs to port 8080. The first sets up a schema predicate with @unique @index(exact) @lang via /alter (also unauthenticated in default config). The second sends a crafted JSON mutation to /mutate?commitNow=true where a JSON key contains the predicate name followed by @ and a DQL injection payload in the language tag position. The injection exploits the addQueryIfUnique function in edgraph/server.go, which constructs DQL queries using fmt.Sprintf with unsanitized predicateName that includes the raw pred.Lang value. The Lang field is extracted from JSON mutation keys by x.PredicateLang(), which splits on @, and is never validated by any function in the codebase. The attacker injects a closing parenthesis to escape the eq() function, adds an arbitrary named query block, and uses a # comment to neutralize trailing template syntax. The injected query executes server-side and its results are returned in the HTTP response. This vulnerability is fixed in 25.3.3.

Deeper analysisAI

CVE-2026-41328 affects Dgraph, an open source distributed GraphQL database, in versions prior to 25.3.3. The vulnerability enables an unauthenticated attacker to gain full read access to every piece of data in the database when using the default configuration without ACL enabled. It arises from a DQL injection flaw in the addQueryIfUnique function within edgraph/server.go, where the function constructs DQL queries using fmt.Sprintf with an unsanitized predicateName that incorporates the raw pred.Lang value. This Lang field is parsed from JSON mutation keys via x.PredicateLang(), which splits on @ without any validation.

An unauthenticated attacker with network access to port 8080 can exploit this via two HTTP POST requests. The first targets /alter to create a schema predicate with @unique @index(exact) @lang, also unauthenticated in the default config. The second sends a crafted JSON mutation to /mutate?commitNow=true, where a JSON key embeds the predicate name followed by @ and an injection payload in the language tag position. The payload escapes the eq() function with a closing parenthesis, injects an arbitrary named query block, and uses a # comment to neutralize trailing template syntax, executing the query server-side and returning results in the HTTP response. The CVSS score is 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), linked to CWE-943.

The vulnerability is fixed in Dgraph version 25.3.3. Additional details on the issue and mitigation are available in the security advisory at https://github.com/dgraph-io/dgraph/security/advisories/GHSA-x92x-px7w-4gx4.

Details

CWE(s)

Affected Products

dgraph
dgraph
≤ 25.3.3

CVEs Like This One

CVE-2026-41327Same product: Dgraph Dgraph
CVE-2026-40173Same product: Dgraph Dgraph
CVE-2026-41492Same product: Dgraph Dgraph
CVE-2026-34976Same product: Dgraph Dgraph
CVE-2026-30941Shared CWE-943
CVE-2026-29793Shared CWE-943
CVE-2026-32247Shared CWE-943
CVE-2025-24787Shared CWE-943
CVE-2026-32248Shared CWE-943
CVE-2026-33980Shared CWE-943

References