{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T07:48:32.187","vulnerabilities":[{"cve":{"id":"CVE-2022-21708","sourceIdentifier":"security-advisories@github.com","published":"2022-01-21T23:15:08.457","lastModified":"2024-11-21T06:45:16.903","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. The issue has been patched in version `v1.3.0`. The only known workaround for this issue is to disable the `graphql.MaxDepth` option from your schema which is not recommended."},{"lang":"es","value":"graphql-go es un servidor GraphQL con un enfoque en la facilidad de uso. En versiones anteriores a 1.3.0, se presenta una vulnerabilidad DoS posible debido a un fallo en la librería que permitiría a un atacante con consultas específicamente diseñadas causar pánicos de desbordamiento de pila. Cualquier usuario con acceso al handler de GraphQL puede enviar estas consultas y causar desbordamientos de pila. Esto, a su vez, podría comprometer la capacidad del servidor para servir datos a sus usuarios. El problema ha sido parcheado en la versión \"v1.3.0\". La única medida de mitigación conocida para este problema es deshabilitar la opción \"graphql.MaxDepth\" de su esquema, lo que no es recomendado"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:N/A:P","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-674"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:graphql-go_project:graphql-go:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"862B5B19-45A0-4DD1-8A67-F585CE716B1D"}]}]}],"references":[{"url":"https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}