Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-53wg-r69p-v3r7 | GraphQL Modules has a Race Condition issue |
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Graphql-hive
Graphql-hive graphql-modules |
|
| Vendors & Products |
Graphql-hive
Graphql-hive graphql-modules |
Fri, 16 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GraphQL Modules is a toolset of libraries and guidelines dedicated to create reusable, maintainable, testable and extendable modules out of your GraphQL server. From 2.2.1 to before 2.4.1 and 3.1.1, when 2 or more parallel requests are made which trigger the same service, the context of the requests is mixed up in the service when the context is injected via @ExecutionContext(). ExecutionContext is often used to pass authentication tokens from incoming requests to services loading data from backend APIs. This vulnerability is fixed in 2.4.1 and 3.1.1. | |
| Title | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in graphql-modules | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-16T20:28:19.571Z
Reserved: 2026-01-15T15:45:01.957Z
Link: CVE-2026-23735
Updated: 2026-01-16T20:28:11.535Z
Status : Deferred
Published: 2026-01-16T20:15:51.473
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-23735
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:45:38Z
Github GHSA