AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-CWE-306

GraphQL Unauthenticated Mutation Detected

Severity:
Medium
Summary

Your web application allows the execution of GraphQL mutations without proper authentication.

In GraphQL, mutations are operations that can cause data writes or changes on the server. Technically, any query in GraphQL can be made to modify data, but the best practice and convention are that any operations causing writes should be done via mutations.

Unauthenticated mutations can lead to unauthorized changes in your application data, which can have detrimental consequences ranging from data corruption to unauthorized access to sensitive data. It's recommended to authenticate all GraphQL mutations to ensure only authorized users can make changes.

Impact

Allowing unauthenticated mutations in your GraphQL server can pose a security risk. Unauthorized actors can make undesired changes, manipulate data, and potentially gain unauthorized access to protected resources.

Remediation

It's recommended to authenticate all GraphQL mutations: ensure that all GraphQL mutations require proper authentication before execution. Implement strong authentication mechanisms and periodically review the access controls to mutations. It's also recommended to use role-based access control (RBAC) to grant permissions only to specific mutations based on the user's role.

Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

No items found.