Feb 15, 2026·8 min read·13 visits
The `@envelop/graphql-modules` plugin failed to properly isolate request contexts, leading to a race condition. Under load, Request A can access Request B's data (and vice-versa), causing severe cross-tenant data leaks and privilege escalation.
A high-severity race condition in the `@envelop/graphql-modules` plugin allows for context bleeding between concurrent GraphQL requests. Due to improper lifecycle management of dependency injection containers, the plugin fails to isolate execution contexts in asynchronous environments. This results in a scenario where a user's request might inadvertently access or modify the session data, authentication tokens, or internal state of another simultaneous user's request. This vulnerability essentially negates previous thread-safety fixes in the core `graphql-modules` library when used within the Envelop ecosystem.
In the world of Node.js, we often lull ourselves into a false sense of security because, "Hey, it's single-threaded! I don't need to worry about mutexes or semaphores!" While true that you don't have thread contention in the CPU sense, you absolutely have concurrency contention in the event loop. And nowhere is this more dangerous than when you mix Dependency Injection (DI) with GraphQL.
@envelop/graphql-modules is the glue that binds the powerful module system of graphql-modules to the Envelop execution pipeline (used by tools like GraphQL Yoga). The goal is noble: allow developers to inject request-scoped data (like currentUser or authToken) into their resolvers cleanly. It’s supposed to be a private booth for every request.
But here's the catch: the plugin was managing the velvet rope to that private booth manually. Instead of letting the core library handle the guest list, the plugin decided to manually create and destroy the "operation controllers" (the DI containers). In a high-concurrency environment, this manual management failed to respect the asynchronous boundaries of the runtime. The result? You walk into your private booth, and someone else is already sitting there, drinking your champagne and reading your emails.
To understand this bug, you have to understand the architecture of graphql-modules. It uses a heavy reliance on Dependency Injection. When a request comes in, the library is supposed to spin up a transient, request-scoped container that holds data relevant only to that specific execution.
The vulnerability, tracked as GHSA-H3HW-29FV-2X75, is effectively a regression or bypass of a previous fix (CVE-2026-23735). The core graphql-modules library had already implemented complex logic to ensure that context didn't bleed across async ticks. However, the @envelop/graphql-modules plugin bypassed these safeguards by manually instantiating the controller.
The flaw resided in the onContextBuilding hook. The plugin would create an OperationController and attach it to the context. It assumed that the context object passed into the resolvers would remain referentially unique and isolated throughout the entire async execution chain. However, in the Node.js event loop, when you have heavy concurrency (multiple requests hitting await points simultaneously), the internal pointer to the "current injector" got crossed.
Because the plugin was manually driving the lifecycle (createOperationController -> destroy), it missed the subtle internal wiring required to keep the AsyncLocalStorage (or its polyfill) coherent. This meant that when Resolver A yielded to the event loop to fetch data from a database, and Resolver B started executing, Resolver B might overwrite the shared singleton state. When Resolver A woke up, it would see Resolver B's data.
The fix is a textbook example of "stop trying to be smart and let the framework handle it." The developers moved from manually managing the controller lifecycle to using the framework's native wrappers.
In the vulnerable version (< 9.1.0), the code looked something like this. Notice how it manually hooks into onContextBuilding and tries to manage the controller itself:
// VULNERABLE CODE
import { useGraphQLModules } from '@envelop/graphql-modules';
// Inside the plugin definition
onContextBuilding({ extendContext, context }) {
// Manual creation of the controller.
// This is where the race begins.
const controller = app.createOperationController({
context,
autoDestroy: false
});
// Manually extending the context.
// This object is not properly protected against async bleed.
extendContext({
...controller.context,
[graphqlModulesControllerSymbol]: controller
});
}
onExecuteDone({ context }) {
// Trying to clean up manually after execution.
// Too little, too late if the bleed happened during execution.
const controller = context[graphqlModulesControllerSymbol];
controller?.destroy();
}In version 9.1.0 (commit ab49fa2), the entire manual lifecycle management was ripped out. Instead, they utilized app.createExecution(). This method wraps the entire execution function, ensuring that the graphql-modules internal context management (likely using proper closure binding or AsyncLocalStorage) is active for the duration of the call.
// PATCHED CODE
onExecute({ setExecuteFn, executeFn }) {
// Wrap the execution function.
// This ensures the framework manages the scope boundary.
setExecuteFn(
app.createExecution({
execute: executeFn,
}),
);
},
onSubscribe({ setSubscribeFn, subscribeFn }) {
// Same thing for subscriptions.
setSubscribeFn(
app.createSubscription({
subscribe: subscribeFn,
}),
);
}By delegating the execution wrapping to app.createExecution, the plugin ensures that the correct injector is associated with the current async resource, effectively closing the race window.
Exploiting this requires nothing more than timing. We don't need buffer overflows or complex gadget chains. we just need to send two requests at the same time and hope the server mixes them up.
Imagine a GraphQL schema where we can query me { username }.
sleep directive or hits a slow resolver. This request is authenticated as attacker.admin.In a vulnerable setup, if both requests hit a service injecting @ExecutionContext(), the internal state might get swapped during the await of Request A.
Here is a simplified reproduction script. If the vulnerability exists, the requestId echoed back will mismatch the one sent in the headers.
const axios = require('axios');
const assert = require('assert');
const TARGET = 'http://localhost:4000/graphql';
// A query that reflects a value from the context
const QUERY = `
query CheckContext {
myContextValue
}
`;
async function sendRequest(id, delay) {
try {
const response = await axios.post(TARGET,
{ query: QUERY },
{
headers: { 'x-request-id': id, 'x-delay': delay }
}
);
const returnedId = response.data.data.myContextValue;
if (returnedId !== id) {
console.error(`[CRITICAL] BLEED DETECTED! Sent: ${id}, Got: ${returnedId}`);
return true;
} else {
console.log(`[SAFE] Request ${id} is clean.`);
return false;
}
} catch (e) {
console.error(e.message);
return false;
}
}
// Fire two requests concurrently
(async () => {
console.log("Firing race condition check...");
const results = await Promise.all([
sendRequest('REQ_A_SLOW', 500), // Delays inside resolver
sendRequest('REQ_B_FAST', 0) // Returns immediately
]);
if (results.some(r => r)) {
console.log("Vulnerability confirmed.");
}
})();If the server is vulnerable, REQ_A_SLOW might wake up from its delay and find that its context now contains the ID REQ_B_FAST because the singleton service was overwritten by the second request.
The impact of this vulnerability is insidious because it is silent. There are no crash logs. There are no error stack traces indicating a failure. The application simply returns the wrong data to the wrong user.
In a multi-tenant SaaS application, this is a nightmare scenario. Tenant A queries for their invoices. Due to the race condition, the tenantId in the context is swapped with Tenant B's tenantId. Tenant A receives a list of Tenant B's invoices.
If the context is used to store authorization roles (e.g., user.isAdmin), an attacker could potentially escalate privileges. By timing their requests to coincide with an administrator's activity (perhaps triggered by a CSRF or social engineering), the attacker's request could inherit the isAdmin: true flag from the concurrent admin request.
The CVSS score indicates Confidentiality: None in some automated assessments because the vulnerability itself is an integrity issue (state corruption). However, do not be fooled. In practice, integrity corruption of an authentication context leads directly to confidentiality loss. If I can become you, I can see your secrets.
The remediation is straightforward: Update immediately.
This is not a configuration issue you can tweak away. The flaw is in the compiled code of the plugin. You must upgrade @envelop/graphql-modules to version 9.1.0 or higher.
package.json or yarn.lock for @envelop/graphql-modules. usage.npm install @envelop/graphql-modules@latest or yarn upgrade @envelop/graphql-modules.>= 9.1.0.As a developer, you should also look at how you are using Dependency Injection. Avoid storing stateful data in Singleton services unless absolutely necessary. Prefer passing the context object explicitly through resolver arguments rather than relying on implicit injection if your framework's thread-safety is in doubt.
Additionally, implement canary tests in your CI/CD pipeline that specifically target race conditions. Use tools like k6 or custom scripts (like the PoC above) to hammer your endpoints with concurrent requests asserting that the output matches the input identity.
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N| Product | Affected Versions | Fixed Version |
|---|---|---|
@envelop/graphql-modules The Guild | < 9.1.0 | 9.1.0 |
| Attribute | Detail |
|---|---|
| CWE | CWE-362 (Race Condition) |
| CVSS v4.0 | 8.7 (High) |
| Attack Vector | Network |
| Privileges Required | None |
| Impact | Context/Session Bleeding |
| Affected Component | @envelop/graphql-modules plugin |
The application contains a race condition that allows concurrent execution using shared resources with improper synchronization, leading to context bleeding.