Dgraph CVE-2026-41328: Unauthenticated Data Read Access Critical Flaw
A critical vulnerability, CVE-2026-41328, has been identified in Dgraph, an open-source distributed GraphQL database. The National Vulnerability Database reports that versions prior to 25.3.3 are susceptible to unauthenticated full read access to all data. This flaw affects Dgraph’s default configuration where Access Control Lists (ACL) are not enabled, making it a significant risk for deployments that haven’t explicitly hardened their setup.
The attack vector is straightforward, requiring two unauthenticated HTTP POST requests to port 8080. The first request establishes a schema predicate via /alter, and the second sends a crafted JSON mutation to /mutate?commitNow=true. The injection abuses the addQueryIfUnique function in edgraph/server.go, which constructs DQL queries using fmt.Sprintf with unsanitized predicateName values. Specifically, the Lang field, extracted from JSON mutation keys, is never validated, allowing an attacker to inject arbitrary DQL. This results in server-side query execution and data exfiltration directly in the HTTP response.
This isn’t theoretical; it’s a direct DQL injection that bypasses authentication in a default configuration. The attacker’s calculus here is simple: if Dgraph is exposed on port 8080 with default settings, it’s an open book. Defenders need to recognize that ‘default config’ often means ‘most vulnerable config.’ The fix is in version 25.3.3.
What This Means For You
- If your organization uses Dgraph, you need to immediately verify your version. If it's prior to 25.3.3 and ACLs are not enabled, assume compromise. Patch to 25.3.3 without delay, and review all Dgraph instances for network exposure on port 8080. This isn't just a potential data leak; it's a full data dump for an unauthenticated attacker.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41328: Dgraph Unauthenticated Data Read via /alter and /mutate
title: CVE-2026-41328: Dgraph Unauthenticated Data Read via /alter and /mutate
id: scw-2026-04-24-ai-1
status: experimental
level: critical
description: |
Detects the two-stage HTTP POST requests to Dgraph on port 8080. The first request targets '/alter' to modify the schema, and the second targets '/mutate' with 'commitNow=true'. The detection specifically looks for characters indicative of the DQL injection payload in the URI of the second request: a closing parenthesis ')', an '@' symbol, and a '#' comment character, which are crucial for exploiting the vulnerability in Dgraph versions prior to 25.3.3.
author: SCW Feed Engine (AI-generated)
date: 2026-04-24
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-41328/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection_base:
cs-method:
- 'POST'
dst_port:
- 8080
selection_indicators_alter:
uri|endswith:
- '/alter'
selection_indicators_mutate:
uri|contains:
- '/mutate'
cs-uri-query|contains:
- 'commitNow=true'
selection_payload:
cs-uri|contains:
- ')'
cs-uri|contains:
- '@'
cs-uri|contains:
- '#'
condition: selection_base AND selection_indicators_alter AND selection_indicators_mutate AND selection_payload
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41328 | Information Disclosure | Dgraph versions prior to 25.3.3 |
| CVE-2026-41328 | Code Injection | Dgraph default configuration with ACL not enabled |
| CVE-2026-41328 | Code Injection | HTTP POST to /alter on port 8080 to set up schema predicate |
| CVE-2026-41328 | Code Injection | HTTP POST to /mutate?commitNow=true on port 8080 with crafted JSON mutation and DQL injection payload in language tag position |
| CVE-2026-41328 | Code Injection | Vulnerable function: addQueryIfUnique in edgraph/server.go due to unsanitized pred.Lang value |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 24, 2026 at 22:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.