First published: Wed Mar 12 2025(Updated: )
# Summary Loading a malicious schema definition in `GraphQL::Schema.from_introspection` (or `GraphQL::Schema::Loader.load`) can result in remote code execution. Any system which loads a schema by JSON from an untrusted source is vulnerable, including those that use [GraphQL::Client](https://github.com/github-community-projects/graphql-client) to load external schemas via GraphQL introspection.
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/graphql | >=1.11.5<1.11.11 | 1.11.11 |
rubygems/graphql | >=2.1.0<2.1.15 | 2.1.15 |
rubygems/graphql | >=1.12.0<1.12.25 | 1.12.25 |
rubygems/graphql | >=1.13.0<1.13.24 | 1.13.24 |
rubygems/graphql | >=2.0.0<2.0.32 | 2.0.32 |
rubygems/graphql | >=2.2.10<2.2.17 | 2.2.17 |
rubygems/graphql | >=2.3.0<2.3.21 | 2.3.21 |
rubygems/graphql | >=2.4.0<2.4.13 | 2.4.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-q92j-grw3-h492 is high due to the potential for remote code execution.
To fix GHSA-q92j-grw3-h492, upgrade to GraphQL version 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, 2.3.21, or 2.4.13.
Applications that load a GraphQL schema from untrusted JSON sources are vulnerable to GHSA-q92j-grw3-h492.
Yes, GHSA-q92j-grw3-h492 can significantly impact production environments due to the risk of remote code execution.
Developers should immediately update their GraphQL library to a secure version to mitigate risks associated with GHSA-q92j-grw3-h492.