CVE-2026-34976
Dgraph · Dgraph
Dgraph contains an unauthenticated admin mutation, allowing attackers to overwrite databases, read sensitive files, and perform SSRF attacks.
Executive summary
An unauthenticated vulnerability in the Dgraph GraphQL database allows remote attackers to fully compromise the database and perform unauthorized file system access.
Vulnerability
The restoreTenant admin mutation is missing authorization middleware. This allows unauthenticated attackers to provide malicious backup source URLs, overwrite existing data, and access sensitive server-side files or internal network resources.
Business impact
This vulnerability grants an attacker complete control over the database, leading to data loss, theft, and potential pivot points into the internal network via SSRF. The CVSS score of 10.0 underscores the extreme risk to business-critical data and infrastructure.
Remediation
Immediate Action: Update Dgraph instances to version 25.3.1 or later.
Proactive Monitoring: Monitor database access logs for any unauthorized restoreTenant requests or unusual outbound network traffic indicative of SSRF.
Compensating Controls: Ensure Dgraph is not exposed to the public internet and restrict access to administrative ports via network firewalls and VPNs.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
This is a critical security failure requiring urgent intervention. All Dgraph deployments must be patched to 25.3.1 immediately, and network access to administrative endpoints must be strictly audited and limited to trusted sources.