fix(deps): update dependency @apollo/gateway to v2.10.5 [security]#377
Merged
renovate[bot] merged 1 commit intomainfrom Mar 14, 2026
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.10.1→2.10.5GitHub Vulnerability Alerts
CVE-2026-32621
Impact
A vulnerability exists in query plan execution within the gateway that may allow pollution of
Object.prototypein certain scenarios. A malicious client may be able to polluteObject.prototypein gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to polluteObject.prototypein gateway by crafting JSON response payloads that target prototype-inheritable properties.Because
Object.prototypeis shared across the Node.js process, successful exploitation can affect subsequent requests to the gateway instance. This may result in unexpected application behavior, privilege escalation, data integrity issues, or other security impact depending on how polluted properties are subsequently consumed by the application or its dependencies. As of the date of this advisory, Apollo is not aware of any reported exploitation of this vulnerability.Patches
Mitigations addressing prototype pollution exposure have been applied in
@apollo/federation-internals,@apollo/gateway, and@apollo/query-plannerversions2.9.6,2.10.5,2.11.6,2.12.3, and2.13.2. Users are encouraged to upgrade to these versions or later at their earliest convenience.Workarounds
A fully effective workaround is not available without a code change. As an interim measure, users who are unable to upgrade immediately may consider placing an input validation layer in front of the gateway to filter operations containing GraphQL names matching known
Object.prototypepollution patterns (e.g.,__proto__,constructor,prototype). Users should also ensure that subgraphs in their federated graph originate from trusted sources.Release Notes
apollographql/federation (@apollo/gateway)
v2.10.5Compare Source
Patch Changes
Fixed several code paths that access response objects to prevent JavaScript prototype pollution and unintended access to the prototype chain. (#3399)
See the associated GitHub Advisories GHSA-pfjj-6f4p-rvmh for more information.
Updated dependencies [
1ce248dcb2c297cab185dde08347710f8ceda3e3]:v2.10.4Compare Source
Patch Changes
8377f039b4c888ecdda2a2b0b0ca181a343cb81a,20c75d1d60a48fc289d88c8d29652f1afc7553e4]:v2.10.3Compare Source
Patch Changes
2b88aec38d5bacb6ec815d885fdac47ef415124a,18a9cfaf533602bb37fdf22962539ce0eae948c8,9c0aaa0874c98ae8ce0cc38cad7f6f25d2c29635,f94e7b35c43ed64c67ff25c7aeb86ec0dd73370a]:v2.10.2Compare Source
Patch Changes
0e457586002f5fd06eacfd00954ef1e285fd52d6]:Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.