Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43967
PUBLISHED
More InfoOfficial Page
Assigner-EEF
Assigner Org ID-6b3ad84c-e1a6-4bf7-a703-f496b71e49db
View Known Exploited Vulnerability (KEV) details
Published At-08 May, 2026 | 15:42
Updated At-09 May, 2026 | 04:18
Rejected At-
▼CVE Numbering Authority (CNA)
Quadratic fragment-name uniqueness check causes denial of service in absinthe

Inefficient Algorithmic Complexity vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via quadratic fragment-name uniqueness validation. 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames':run/2 iterates over all fragments and for each one calls duplicate?/2, which evaluates Enum.count(fragments, &(&1.name == name)) — a full linear scan of the fragment list. The result is O(N²) comparisons per document, where N is the number of fragment definitions supplied by the caller. Because input.fragments is built directly from the GraphQL query body, N is fully attacker-controlled. A minimum-size fragment definition is roughly 16 bytes, so a ~1 MB document carries ~60,000 fragments and forces ~3.6 × 10⁹ comparisons inside this single validation phase. No authentication, schema knowledge, or special configuration is required. This issue affects absinthe: from 1.2.0 before 1.10.2.

Affected Products
Vendor
absinthe-graphql
Product
absinthe
Collection URL
https://repo.hex.pm
Package Name
absinthe
Repo
https://github.com/absinthe-graphql/absinthe
CPEs
  • cpe:2.3:a:absinthe-graphql:absinthe:*:*:*:*:*:*:*:*
Modules
  • 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames'
Program Files
  • lib/absinthe/phase/document/validation/unique_fragment_names.ex
Program Routines
  • 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames':run/2
  • 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames':duplicate?/2
Default Status
unaffected
Versions
Affected
  • From 1.2.0 before 1.10.2 (semver)
Vendor
absinthe-graphql
Product
absinthe
Collection URL
https://github.com
Package Name
absinthe-graphql/absinthe
Repo
https://github.com/absinthe-graphql/absinthe
CPEs
  • cpe:2.3:a:absinthe-graphql:absinthe:*:*:*:*:*:*:*:*
Modules
  • 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames'
Program Files
  • lib/absinthe/phase/document/validation/unique_fragment_names.ex
Program Routines
  • 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames':run/2
  • 'Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames':duplicate?/2
Default Status
unaffected
Versions
Affected
  • From 0b46e3bcc06c0d3797bacd64761b908a84646c1d before 223600c520493dcaf95080af552c413099f92c9d (git)
Problem Types
TypeCWE IDDescription
CWECWE-407CWE-407 Inefficient Algorithmic Complexity
Type: CWE
CWE ID: CWE-407
Description: CWE-407 Inefficient Algorithmic Complexity
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-229CAPEC-229 Serialized Data Parameter Blowup
CAPEC ID: CAPEC-229
Description: CAPEC-229 Serialized Data Parameter Blowup
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Peter Ullrich
remediation developer
Curtis Schiewek
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/absinthe-graphql/absinthe/security/advisories/GHSA-9mhv-8h52-q7q2
vendor-advisory
related
https://cna.erlef.org/cves/CVE-2026-43967.html
related
https://osv.dev/vulnerability/EEF-CVE-2026-43967
related
https://github.com/absinthe-graphql/absinthe/commit/223600c520493dcaf95080af552c413099f92c9d
patch
Hyperlink: https://github.com/absinthe-graphql/absinthe/security/advisories/GHSA-9mhv-8h52-q7q2
Resource:
vendor-advisory
related
Hyperlink: https://cna.erlef.org/cves/CVE-2026-43967.html
Resource:
related
Hyperlink: https://osv.dev/vulnerability/EEF-CVE-2026-43967
Resource:
related
Hyperlink: https://github.com/absinthe-graphql/absinthe/commit/223600c520493dcaf95080af552c413099f92c9d
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found