Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: pkgsRocm.python3Packages.strawberry-graphql

Found 2 matching suggestions

View:
Compact
Detailed
Permalink CVE-2026-35526
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 day, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package pkgsRocm.python3Packages.strawberry-django
  • @LeSuisse removed package python313Packages.strawberry-django
  • @LeSuisse removed package python312Packages.strawberry-django
  • @LeSuisse removed package strawberry-qt6
  • @LeSuisse removed package strawberry
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Strawberry GraphQL affected by a Denial of Service via unbounded WebSocket subscriptions

Strawberry GraphQL is a library for creating GraphQL APIs. Prior to 0.312.3, Strawberry GraphQL's WebSocket subscription handlers for both the graphql-transport-ws and legacy graphql-ws protocols allocate an asyncio.Task and associated Operation object for every incoming subscribe message without enforcing any limit on the number of active subscriptions per connection. An unauthenticated attacker can open a single WebSocket connection, send connection_init, and then flood subscribe messages with unique IDs. Each message unconditionally spawns a new asyncio.Task and async generator, causing linear memory growth and event loop saturation. This leads to server degradation or an OOM crash. This vulnerability is fixed in 0.312.3.

Affected products

strawberry
  • ==< 0.312.3

Matching in nixpkgs

Ignored packages (5)

Package maintainers

Permalink CVE-2026-35523
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 day, 23 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package strawberry
  • @LeSuisse removed package strawberry-qt6
  • @LeSuisse removed package python312Packages.strawberry-django
  • @LeSuisse removed package python313Packages.strawberry-django
  • @LeSuisse removed package pkgsRocm.python3Packages.strawberry-django
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Authentication bypass in strawberry-graphql via legacy graphql-ws WebSocket subprotocol

Strawberry GraphQL is a library for creating GraphQL APIs. Strawberry up until version 0.312.3 is vulnerable to an authentication bypass on WebSocket subscription endpoints. The legacy graphql-ws subprotocol handler does not verify that a connection_init handshake has been completed before processing start (subscription) messages. This allows a remote attacker to skip the on_ws_connect authentication hook entirely by connecting with the graphql-ws subprotocol and sending a start message directly, without ever sending connection_init. This vulnerability is fixed in 0.312.3.

Affected products

strawberry
  • ==< 0.312.3

Matching in nixpkgs

Ignored packages (5)

Package maintainers