The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-32971

CVE-2024-32971: Apollo Router Query Plan Caching RCE Flaw

CVE-2024-32971 is an RCE vulnerability in Apollo Router affecting distributed query plan caching. It causes unintended operations and data exposure. This article covers technical details, affected versions, and fixes.

Published: April 15, 2026

CVE-2024-32971 Overview

CVE-2024-32971 is a critical GraphQL Vulnerability affecting Apollo Router, a configurable graph router written in Rust used to run federated supergraphs with Apollo Federation 2. The vulnerability exists in the distributed query plan caching mechanism and can lead to unexpected operations being executed, resulting in unintended data exposure or side effects.

When distributed query plan caching is enabled, a bug in the cache retrieval logic can cause the Router to execute a modified version of a previously cached operation instead of the intended operation. This affects queries, mutations, and subscriptions, potentially leading to data leakage or unauthorized data modifications.

Critical Impact

Attackers may exploit this cache confusion vulnerability to access unauthorized data through queries (e.g., fetching enterprise user data instead of trial users) or trigger unintended mutations (e.g., deleting the wrong user record), leading to significant data integrity and confidentiality breaches.

Affected Products

  • Apollo Router version 1.44.0
  • Apollo Router version 1.45.0
  • Apollo Router instances with distributed query plan caching enabled using Redis

Discovery Timeline

  • 2024-05-02 - CVE-2024-32971 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2024-32971

Vulnerability Analysis

This vulnerability (CWE-440: Expected Behavior Violation) occurs when the Apollo Router's cache retrieval logic fails to properly differentiate between cached query plans. In a federated GraphQL architecture, query plans are pre-computed execution strategies that determine how operations are routed to underlying subgraph servers.

The core issue lies in how the Router handles cache key generation or lookup for distributed query plan caching with Redis. When multiple operations share similar characteristics, the cache may return an incorrect query plan, causing the Router to execute a variation of a different, previously-cached operation.

For query operations, this could mean fetching data with different filter parameters than intended (e.g., fetchUsers(type: ENTERPRISE) executing instead of fetchUsers(type: TRIAL)). For mutations, the consequences are more severe—incorrect mutations may be sent to subgraph servers, such as deleteUser(id: 12) executing instead of deleteUser(id: 10), leading to data corruption or unauthorized modifications.

Root Cause

The root cause is a bug in Apollo Router's cache retrieval logic for distributed query plan caching. The cache key generation or matching algorithm does not adequately distinguish between different operations, causing query plans for one operation to be incorrectly applied to another. This inadvertent execution of cached plans for modified or different operations leads to the observed misbehavior.

Attack Vector

The vulnerability is exploitable over the network without authentication requirements. An attacker could potentially craft GraphQL requests designed to exploit the cache confusion, manipulating the timing or sequence of requests to cause the Router to return cached results or execute cached mutations intended for different operations. The attack requires the target Router to have distributed query plan caching enabled with Redis.

The following code snippets show the version bump from the security patch:

text
[[package]]
name = "apollo-router"
-version = "1.45.0"
+version = "1.45.1"
dependencies = [
 "access-json",
 "anyhow",

Source: GitHub Commit Update

Detection Methods for CVE-2024-32971

Indicators of Compromise

  • Unexpected query results that don't match the requested parameters or filters
  • Mutation operations affecting incorrect records or entities
  • Log entries showing cache hits for operations that should be cache misses
  • User reports of seeing data belonging to other users or incorrect data sets
  • Audit trail discrepancies showing operations executed with different parameters than logged

Detection Strategies

  • Monitor GraphQL operation logs for parameter mismatches between requests and executed operations
  • Implement correlation checks between client-requested operations and actual subgraph queries
  • Enable detailed Redis cache logging to track query plan retrieval anomalies
  • Deploy application-level monitoring for unexpected mutation side effects
  • Use SentinelOne Singularity to detect anomalous application behavior patterns indicative of cache manipulation

Monitoring Recommendations

  • Configure alerting for Redis cache anomalies and unexpected hit/miss ratios
  • Implement end-to-end request tracing to correlate client requests with subgraph operations
  • Monitor for unusual patterns in data access that may indicate cache confusion exploitation
  • Review Apollo Router logs for operation execution discrepancies
  • Establish baseline metrics for query plan cache behavior to identify deviations

How to Mitigate CVE-2024-32971

Immediate Actions Required

  • Upgrade Apollo Router to version 1.45.1 or higher immediately
  • Alternatively, downgrade to version 1.43.2 if upgrading is not feasible
  • Disable distributed query plan caching if immediate patching is not possible
  • Audit recent mutations for potential unauthorized modifications
  • Review data access logs for evidence of exploitation

Patch Information

Apollo has released version 1.45.1 to address this vulnerability. Versions 1.44.0 and 1.45.0 have been withdrawn and should not be used. The fix corrects the cache retrieval logic to ensure query plans are properly matched to their intended operations.

For additional details, refer to the GitHub Security Advisory GHSA-q9p4-hw9m-fj2v and the GitHub Release v1.45.1.

Workarounds

  • Disable distributed query plan caching by removing or commenting out the Redis caching configuration
  • Use local in-memory caching only until patching is complete
  • Implement additional application-layer validation to verify operation execution matches client requests
  • Consider temporarily disabling caching for mutation operations specifically
yaml
# Disable distributed query plan caching in router.yaml
# Comment out or remove the following configuration:
# supergraph:
#   query_planning:
#     cache:
#       redis:
#         urls: ["redis://..."]

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechApollo Router

  • SeverityCRITICAL

  • CVSS Score9.0

  • EPSS Probability0.21%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-440
  • Technical References
  • GitHub Commit Update

  • GitHub Release v1.45.1

  • GitHub Security Advisory GHSA-q9p4-hw9m-fj2v

  • Apollo GraphQL Documentation
  • Related CVEs
  • CVE-2025-64347: Apollo Router Auth Bypass Vulnerability

  • CVE-2025-64173: Apollo Router Auth Bypass Vulnerability

  • CVE-2025-32032: Apollo Router Core DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English