<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33756 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33756/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33756/feed.xml" rel="self" type="application/rss+xml"/><item><title>Saleor GraphQL Batch Query Resource Exhaustion Vulnerability (CVE-2026-33756)</title><link>https://feed.craftedsignal.io/briefs/2026-04-saleor-resource-exhaustion/</link><pubDate>Thu, 09 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-saleor-resource-exhaustion/</guid><description>Unauthenticated attackers can exploit a resource exhaustion vulnerability (CVE-2026-33756) in Saleor e-commerce platform versions before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118 by sending a single HTTP request with a large number of GraphQL operations, bypassing query complexity limits and exhausting server resources.</description><content:encoded><![CDATA[<p>Saleor, an e-commerce platform, is susceptible to a resource exhaustion vulnerability affecting versions 2.0.0 prior to 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118. This vulnerability stems from the platform&rsquo;s support for query batching, where multiple GraphQL operations can be submitted in a single HTTP request as a JSON array. The absence of an upper limit on the number of operations within a single request allows unauthenticated attackers to bypass per-query complexity limits. By sending a single HTTP request containing a massive number of GraphQL operations, an attacker can exhaust server resources, potentially leading to denial of service. The vulnerability is addressed in versions 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118. Defenders must ensure they are running patched versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Saleor instance running a vulnerable version (prior to 3.23.0a3, 3.22.47, 3.21.54, or 3.20.118).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the GraphQL endpoint (typically <code>/graphql/</code>).</li>
<li>The request body contains a JSON array representing a batch of GraphQL queries.</li>
<li>The number of GraphQL operations within the array is excessively large, designed to bypass query complexity limits.</li>
<li>The Saleor server processes the HTTP request, attempting to execute all GraphQL operations within the batch.</li>
<li>Due to the large number of operations, the server&rsquo;s resources (CPU, memory) become heavily utilized.</li>
<li>The server becomes slow or unresponsive to legitimate user requests, causing a denial-of-service condition.</li>
<li>The attacker repeats the process to maintain the denial-of-service state, impacting legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in resource exhaustion on the Saleor e-commerce platform. This can lead to slow response times, application instability, and ultimately a denial-of-service condition for legitimate users. This vulnerability poses a significant risk to e-commerce businesses relying on Saleor, potentially impacting sales, customer satisfaction, and overall business operations. The number of potential victims is directly proportional to the number of Saleor installations running vulnerable versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Saleor instances to versions 3.23.0a3, 3.22.47, 3.21.54, or 3.20.118 or later to patch CVE-2026-33756.</li>
<li>Deploy the Sigma rule <code>Detect High Volume of GraphQL Queries</code> to identify potential exploitation attempts by monitoring the number of GraphQL queries within a single HTTP request in web server logs.</li>
<li>Monitor web server logs for abnormally large HTTP POST requests to the <code>/graphql/</code> endpoint.</li>
<li>Implement rate limiting on the GraphQL endpoint to restrict the number of requests from a single IP address within a defined timeframe.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>resource-exhaustion</category><category>graphql</category><category>cve-2026-33756</category><category>dos</category></item></channel></rss>