AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-CWE-200

GraphQL Introspection Query Enabled

Severity:
Medium
Summary

Your web application is running with GraphQL Introspection Query enabled in a production environment.

GraphQL Introspection Query is a feature built into the GraphQL specification that allows clients to query the schema of a GraphQL server. By executing an introspection query, a client can retrieve detailed information about the types, fields, arguments, and other schema elements supported by the server. This information is useful for generating documentation, building client-side tools, or dynamically exploring the API's structure.

Introspection queries enable developers to understand the available queries, mutations, and data types within a GraphQL API, facilitating seamless interaction between clients and the API. However, in a production environment, exposing this information may pose a security risk, as attackers could use the obtained schema details to craft targeted attacks, exploit other vulnerabilities, or gain unauthorized access to protected resources. Therefore, it's essential to disable or restrict access to introspection queries in production environments to prevent unauthorized access and information leakage.

Impact

Enabling GraphQL Introspection Query in a production environment can lead to unauthorized access to sensitive schema information, potentially revealing the underlying structure and data types of the API. Attackers can use this information to craft targeted attacks, exploit other vulnerabilities within the system, or gain unauthorized access to protected resources.

Remediation

Disable Introspection Query: Ensure that the GraphQL Introspection Query is disabled or restricted in production environments. Keep it enabled only in development or staging environments where access is limited to authorized personnel.

Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

No items found.