Skip to content

fix(deps): update dependency @apollo/gateway to v2.10.5 [security]#377

Merged
renovate[bot] merged 1 commit intomainfrom
renovate/npm-@apollo/gateway-vulnerability
Mar 14, 2026
Merged

fix(deps): update dependency @apollo/gateway to v2.10.5 [security]#377
renovate[bot] merged 1 commit intomainfrom
renovate/npm-@apollo/gateway-vulnerability

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Mar 14, 2026

This PR contains the following updates:

Package Change Age Confidence
@apollo/gateway (source) 2.10.12.10.5 age confidence

GitHub Vulnerability Alerts

CVE-2026-32621

Impact

A vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties.

Because Object.prototype is shared across the Node.js process, successful exploitation can affect subsequent requests to the gateway instance. This may result in unexpected application behavior, privilege escalation, data integrity issues, or other security impact depending on how polluted properties are subsequently consumed by the application or its dependencies. As of the date of this advisory, Apollo is not aware of any reported exploitation of this vulnerability.

Patches

Mitigations addressing prototype pollution exposure have been applied in @apollo/federation-internals, @apollo/gateway, and @apollo/query-planner versions 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2. Users are encouraged to upgrade to these versions or later at their earliest convenience.

Workarounds

A fully effective workaround is not available without a code change. As an interim measure, users who are unable to upgrade immediately may consider placing an input validation layer in front of the gateway to filter operations containing GraphQL names matching known Object.prototype pollution patterns (e.g., __proto__, constructor, prototype). Users should also ensure that subgraphs in their federated graph originate from trusted sources.


Release Notes

apollographql/federation (@​apollo/gateway)

v2.10.5

Compare Source

Patch Changes

v2.10.4

Compare Source

Patch Changes

v2.10.3

Compare Source

Patch Changes

v2.10.2

Compare Source

Patch Changes

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the dependencies Pull requests that update a dependency file label Mar 14, 2026
@renovate renovate bot requested a review from a team as a code owner March 14, 2026 02:07
@renovate renovate bot requested review from msujaws and nina-py and removed request for a team March 14, 2026 02:07
@renovate renovate bot added the dependencies Pull requests that update a dependency file label Mar 14, 2026
@renovate renovate bot merged commit aa52c3a into main Mar 14, 2026
7 checks passed
@renovate renovate bot deleted the renovate/npm-@apollo/gateway-vulnerability branch March 14, 2026 10:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants