The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-40173

CVE-2026-40173: Dgraph Auth Bypass Vulnerability

CVE-2026-40173 is an authentication bypass flaw in Dgraph that exposes admin tokens through an unauthenticated endpoint, allowing attackers to gain full administrative access. This article covers technical details, affected versions, impact, and mitigation steps.

Published: April 17, 2026

CVE-2026-40173 Overview

CVE-2026-40173 is an unauthenticated credential disclosure vulnerability affecting Dgraph, an open source distributed GraphQL database. The vulnerability exists because the /debug/pprof/cmdline endpoint is registered on the default mux and is accessible without authentication, exposing the full process command line including sensitive admin tokens configured via the --security "token=..." startup flag.

An attacker who can reach the Alpha HTTP port can retrieve the leaked admin token and reuse it in the X-Dgraph-AuthToken header to gain unauthorized access to admin-only endpoints such as /admin/config/cache_mb, effectively bypassing the adminAuthHandler token validation mechanism.

Critical Impact

This vulnerability enables unauthorized privileged administrative access including configuration changes and operational control actions in any Dgraph deployment where the Alpha HTTP port is reachable by untrusted parties.

Affected Products

  • Dgraph versions 25.3.1 and prior

Discovery Timeline

  • 2026-04-15 - CVE CVE-2026-40173 published to NVD
  • 2026-04-16 - Last updated in NVD database

Technical Details for CVE-2026-40173

Vulnerability Analysis

This Information Disclosure vulnerability (CWE-200) allows unauthenticated remote attackers to extract sensitive administrative credentials from Dgraph database instances. The root issue stems from improper access control on the debug profiling endpoint, which inadvertently exposes command-line arguments containing security tokens.

The vulnerability is particularly concerning because the exposed token provides full administrative access to the Dgraph instance. Once an attacker obtains the token, they can authenticate to administrative endpoints and perform privileged operations such as modifying cache configuration, altering system settings, and potentially disrupting database operations.

The attack requires only network access to the Alpha HTTP port, making it exploitable remotely without any prior authentication or user interaction. The combination of credential exposure and subsequent privilege escalation creates a significant risk for affected deployments.

Root Cause

The vulnerability originates from the /debug/pprof/cmdline endpoint being registered on the default HTTP multiplexer without appropriate authentication middleware. This debug endpoint is part of Go's standard profiling package (net/http/pprof) and returns the complete command-line arguments of the running process.

When Dgraph administrators configure security tokens using the --security "token=..." command-line flag, these sensitive credentials become visible through the unprotected debug endpoint. The lack of authentication checking on this endpoint allows any network-accessible client to retrieve this information.

Attack Vector

The attack exploits the unauthenticated debug endpoint to extract credentials and then leverages those credentials to access protected administrative functionality:

  1. Reconnaissance: The attacker identifies a Dgraph instance with an accessible Alpha HTTP port
  2. Credential Extraction: The attacker sends an unauthenticated HTTP GET request to /debug/pprof/cmdline
  3. Token Parsing: The attacker extracts the admin token from the returned command-line arguments
  4. Privilege Escalation: The attacker uses the extracted token in the X-Dgraph-AuthToken header to access admin endpoints like /admin/config/cache_mb
  5. Administrative Access: With valid authentication, the attacker can modify configurations and perform operational control actions

For detailed technical information about this vulnerability, see the GitHub Security Advisory GHSA-95mq-xwj4-r47p.

Detection Methods for CVE-2026-40173

Indicators of Compromise

  • HTTP requests to /debug/pprof/cmdline from external or unexpected IP addresses
  • Unusual administrative API calls following access to the pprof endpoint
  • Authentication attempts using the X-Dgraph-AuthToken header from previously unseen sources
  • Configuration changes to admin endpoints such as /admin/config/cache_mb without authorized administrative sessions

Detection Strategies

  • Monitor HTTP access logs for requests to /debug/pprof/* endpoints, particularly from untrusted networks
  • Implement web application firewall rules to block or alert on access to debug profiling endpoints
  • Correlate pprof endpoint access with subsequent authenticated administrative API calls from the same source
  • Deploy network intrusion detection signatures to identify potential credential extraction attempts

Monitoring Recommendations

  • Enable detailed access logging on the Dgraph Alpha HTTP port
  • Set up alerts for any external access to debug or profiling endpoints
  • Monitor for anomalous administrative operations that don't correlate with known administrator activity
  • Implement network segmentation monitoring to detect unauthorized access to database ports

How to Mitigate CVE-2026-40173

Immediate Actions Required

  • Upgrade Dgraph to version 25.3.2 or later immediately
  • If immediate patching is not possible, restrict network access to the Alpha HTTP port using firewall rules
  • Rotate any admin tokens that may have been exposed prior to patching
  • Review access logs for signs of exploitation including requests to /debug/pprof/cmdline

Patch Information

Dgraph has released version 25.3.2 which addresses this vulnerability. The fix prevents unauthenticated access to the /debug/pprof/cmdline endpoint, ensuring that sensitive command-line arguments including security tokens are no longer exposed.

For more information about the patched release, see the GitHub Release v25.3.2.

Workarounds

  • Deploy a reverse proxy or web application firewall in front of Dgraph to block access to /debug/pprof/* endpoints
  • Restrict network access to the Alpha HTTP port to only trusted administrative networks or hosts
  • Consider using environment variables or configuration files instead of command-line flags for sensitive token configuration where supported
  • Implement network segmentation to ensure the Dgraph Alpha HTTP port is not reachable from untrusted networks
bash
# Example: Block access to pprof endpoints using iptables (temporary workaround)
# This should be replaced with proper patching as soon as possible
iptables -A INPUT -p tcp --dport 8080 -m string --string "/debug/pprof" --algo bm -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechDgraph

  • SeverityCRITICAL

  • CVSS Score9.4

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-200
  • Technical References
  • GitHub Release v25.3.2

  • GitHub Security Advisory GHSA-95mq-xwj4-r47p
  • Related CVEs
  • CVE-2026-41492: Dgraph Authentication Bypass Vulnerability

  • CVE-2026-34976: Dgraph Auth Bypass Vulnerability

  • CVE-2026-41327: Dgraph GraphQL Database SQLi Vulnerability

  • CVE-2026-41328: Dgraph Database SQLi Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English