CVE-2025-31481

The Relay Race to Nowhere: Bypassing Auth in API Platform's GraphQL Node Interface

Alon Barad
Alon Barad
Software Engineer

Jan 13, 2026·5 min read·3 visits

Executive Summary (TL;DR)

API Platform's implementation of the GraphQL Relay `node` field failed to load resource-specific security metadata. By querying a sensitive resource via `node(id: "/iri")`, attackers could bypass `security` attributes (like `ROLE_ADMIN`) and read data they shouldn't see. The fix involves forcing a reverse lookup of the operation metadata based on the requested IRI.

A logic error in API Platform's GraphQL Relay implementation allows attackers to bypass security rules by querying resources via the global `node` interface, effectively ignoring configured access controls.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Probability
0.08%
Top 100% most exploited

Affected Systems

API Platform Core < 3.4.17API Platform Core >= 4.0.0, < 4.0.22

Affected Versions Detail

Product
Affected Versions
Fixed Version
api-platform/core
api-platform
< 3.4.173.4.17
api-platform/core
api-platform
>= 4.0.0, < 4.0.224.0.22
AttributeDetail
CWE IDCWE-863 (Incorrect Authorization)
CVSS v3.17.5 (High)
Attack VectorNetwork (GraphQL API)
ImpactConfidentiality Loss (Data Exfiltration)
Exploit StatusTrivial / PoC Available
KEV StatusNot Listed
CWE-863
Incorrect Authorization

The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Vulnerability Timeline

Vulnerability Disclosed
2025-04-03
Patch Released (3.4.17, 4.0.22)
2025-04-03

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.