CVE-2026-43967
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
08/05/2026
Last modified:
08/05/2026
Description
Inefficient Algorithmic Complexity vulnerability in absinthe-graphql absinthe allows unauthenticated denial of service via quadratic fragment-name uniqueness validation.<br />
<br />
&#39;Elixir.Absinthe.Phase.Document.Validation.UniqueFragmentNames&#39;:run/2 iterates over all fragments and for each one calls duplicate?/2, which evaluates Enum.count(fragments, &(&1.name == name)) — a full linear scan of the fragment list. The result is O(N²) comparisons per document, where N is the number of fragment definitions supplied by the caller.<br />
<br />
Because input.fragments is built directly from the GraphQL query body, N is fully attacker-controlled. A minimum-size fragment definition is roughly 16 bytes, so a ~1 MB document carries ~60,000 fragments and forces ~3.6 × 10⁹ comparisons inside this single validation phase. No authentication, schema knowledge, or special configuration is required.<br />
<br />
This issue affects absinthe: from 1.2.0 before 1.10.2.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH



