Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42793— Atom table exhaustion via attacker-controlled GraphQL SDL names in absinthe

EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42793

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Atom table exhaustion via attacker-controlled GraphQL SDL names in absinthe
Source: NVD (National Vulnerability Database)
Vulnerability Description
Allocation of Resources Without Limits or Throttling vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via atom table exhaustion when parsing attacker-controlled GraphQL SDL. Multiple Blueprint.Draft.convert/2 implementations in Absinthe's SDL language modules call String.to_atom/1 on attacker-controlled names from parsed GraphQL SDL documents, including directive names, field names, type names, and argument names. Because atoms are never garbage-collected and the BEAM atom table has a fixed limit (default 1,048,576), each unique name permanently consumes one slot. An attacker can exhaust the atom table by submitting SDL documents containing enough unique names, causing the Erlang VM to abort with system_limit and taking down the entire node. Any application that passes attacker-controlled GraphQL SDL through Absinthe's parser is exposed — for example, a schema-upload endpoint, a federation gateway that ingests remote SDL, or any developer tool that runs the parser over user-supplied documents. This issue affects absinthe: from 1.5.0 before 1.10.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
Absinthe 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Absinthe是Absinthe开源的一个基于Elixir的GraphQL实现框架。 absinthe 1.5.0版本至1.10.2之前版本存在安全漏洞,该漏洞源于资源分配无限制或节流,可能导致未经身份验证的攻击者通过解析攻击者控制的GraphQL SDL耗尽原子表并导致拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
absinthe-graphqlabsinthe 1.5.0 ~ 1.10.2 cpe:2.3:a:absinthe-graphql:absinthe:*:*:*:*:*:*:*:*
absinthe-graphqlabsinthe d0eae7764520d4e8e5dfff619068c0de911aec33 ~ dd842b938e3823f345c10416914ffab5d5536838 cpe:2.3:a:absinthe-graphql:absinthe:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-42793

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42793

登录查看更多情报信息。

Same Patch Batch · absinthe-graphql · 2026-05-08 · 3 CVEs total

CVE-2026-42794Reflected XSS via backslash bypass in GraphiQL js_escape in absinthe_plug
CVE-2026-43967Quadratic fragment-name uniqueness check causes denial of service in absinthe

IV. Related Vulnerabilities

V. Comments for CVE-2026-42793

No comments yet


Leave a comment