Race Condition Affecting @envelop/graphql-modules package, versions <9.1.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.1% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-ENVELOPGRAPHQLMODULES-15091528
  • published25 Jan 2026
  • disclosed21 Jan 2026
  • creditThomas Wiringa

Introduced: 21 Jan 2026

CVE-2026-23735  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade @envelop/graphql-modules to version 9.1.0 or higher.

Overview

@envelop/graphql-modules is a This plugins integrates graphql-modules execution lifecycle into the GraphQL execution flow.

Affected versions of this package are vulnerable to Race Condition via the useGraphQLModules plugin. An attacker can cause request context data to be mixed between parallel requests by making multiple simultaneous requests that trigger the same service, leading to data leakage or unintended access to another user's context.

An application is susceptible to this race condition if its requests are processed together with contexts injected via @ExecutionContext() from a singleton provider.

CVSS Base Scores

version 4.0
version 3.1