Incorrect Privilege Assignment Affecting apollo-router package, versions <1.61.12>=2.0.0-alpha.2 <2.8.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Privilege Assignment vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-APOLLOROUTER-13851567
  • published7 Nov 2025
  • disclosed6 Nov 2025
  • creditUnknown

Introduced: 6 Nov 2025

NewCVE-2025-64347  (opens in a new tab)
CWE-266  (opens in a new tab)

How to fix?

Upgrade apollo-router to version 1.61.12, 2.8.1 or higher.

Overview

apollo-router is a configurable, high-performance routing runtime for Apollo Federation.

Affected versions of this package are vulnerable to Incorrect Privilege Assignment via the access control logic for schema elements when access control directives are renamed using the imports argument in the @link directive. An attacker can gain unauthorized access to protected data by crafting queries that bypass access control requirements on schema elements protected by renamed directives.

Workaround

This vulnerability can be mitigated by removing any renames of access control directives in the imports argument to the @link directive.

References

CVSS Base Scores

version 4.0
version 3.1