PT-2026-29969 · Dgraph · Dgraph
Kodareef5
·
Published
2026-04-02
·
Updated
2026-04-07
·
CVE-2026-34976
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Dgraph versions up to 25.3.0
Description
Dgraph is susceptible to an authentication bypass vulnerability in the 'restoreTenant' admin mutation. This flaw allows unauthenticated attackers to overwrite the entire database, read server-side files, and perform Server-Side Request Forgery (SSRF). The vulnerability stems from the missing authorization middleware configuration for the 'restoreTenant' mutation, allowing attackers to bypass authentication checks. Attackers can leverage this to execute privileged restores using attacker-controlled backup source URLs, including file:// for local filesystem access, S3/MinIO credentials, encryption key file paths, and Vault credential file paths. The vulnerability allows for database overwrites, sensitive file disclosure, and SSRF attacks. The
restoreTenant mutation accepts attacker-controlled backup source URLs (including file:// for local filesystem access), S3/MinIO credentials, encryption key file paths, and Vault credential file paths.Recommendations
Update to version 25.3.1 or later to address the vulnerability. Isolate Dgraph admin endpoints from public access and restrict access to trusted IPs. Monitor and block restoreTenant requests at the network/WAF layer. Rotate exposed credentials and inspect/restore from known-good offline backups. Restrict egress to block SSRF to metadata/internal endpoints and enable centralized audit logging.
Exploit
Fix
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Dgraph