<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>WPGraphQL 1.3.5 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/wpgraphql-1.3.5/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 19:23:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/wpgraphql-1.3.5/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47959: WPGraphQL Plugin Denial of Service via Batched Queries</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47959-wpgraphql-dos/</link><pubDate>Fri, 15 May 2026 19:23:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47959-wpgraphql-dos/</guid><description>The WordPress Plugin WPGraphQL version 1.3.5 is vulnerable to a denial-of-service attack where unauthenticated attackers can exhaust server resources by sending batched GraphQL queries with duplicated fields, potentially causing server out-of-memory conditions and MySQL connection errors.</description><content:encoded><![CDATA[<p>The WPGraphQL plugin, version 1.3.5, for WordPress is susceptible to a denial-of-service (DoS) vulnerability. This vulnerability allows unauthenticated attackers to send specially crafted GraphQL queries to exhaust server resources. By sending batched queries with duplicated fields in POST requests to the GraphQL endpoint, attackers can amplify the load on the server, leading to out-of-memory conditions and MySQL connection errors. This can disrupt the availability of the WordPress site, impacting legitimate users. This vulnerability was published in CVE details in 2021.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using WPGraphQL plugin version 1.3.5.</li>
<li>Attacker crafts a malicious GraphQL query containing batched queries with duplicated fields.</li>
<li>The malicious query is sent as a POST request to the <code>/graphql</code> endpoint of the target WordPress site.</li>
<li>The WPGraphQL plugin processes the query, resulting in excessive memory consumption due to the duplicated fields.</li>
<li>The server attempts to allocate more memory to handle the query processing.</li>
<li>Repeated requests of this nature eventually lead to an out-of-memory (OOM) condition on the server.</li>
<li>The MySQL server, supporting the WordPress site, experiences connection errors due to resource exhaustion.</li>
<li>The WordPress site becomes unavailable to legitimate users due to the denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition, rendering the WordPress site unavailable. The attack exhausts server resources, potentially causing MySQL connection errors and affecting legitimate users&rsquo; access to the website. The number of affected websites depends on the prevalence of WPGraphQL plugin version 1.3.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WPGraphQL Denial of Service Attack</code> to your SIEM to identify potential exploitation attempts by monitoring for POST requests to <code>/graphql</code> containing excessive query length.</li>
<li>Filter web server logs for HTTP POST requests with large payloads to the <code>/graphql</code> endpoint.</li>
<li>Consider rate limiting POST requests to the <code>/graphql</code> endpoint to mitigate potential DoS attacks.</li>
<li>Upgrade to a patched version of the WPGraphQL plugin to remediate CVE-2021-47959.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>denial-of-service</category><category>wordpress</category><category>graphql</category></item></channel></rss>