<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35401 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35401/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 19:25:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35401/feed.xml" rel="self" type="application/rss+xml"/><item><title>Saleor GraphQL Resource Exhaustion Vulnerability (CVE-2026-35401)</title><link>https://feed.craftedsignal.io/briefs/2026-04-saleor-graphql-exhaustion/</link><pubDate>Wed, 08 Apr 2026 19:25:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-saleor-graphql-exhaustion/</guid><description>A remote, unauthenticated attacker can cause resource exhaustion in Saleor e-commerce platforms via maliciously crafted GraphQL API requests, leading to denial of service.</description><content:encoded><![CDATA[<p>CVE-2026-35401 details a resource exhaustion vulnerability affecting the Saleor e-commerce platform. Present in versions 2.0.0 up to, but not including, 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, the flaw allows an unauthenticated, remote attacker to exhaust server resources. This is achieved by sending a single API call containing numerous GraphQL mutations or queries, leveraging aliases or chaining techniques. The excessive processing load induced by these malicious requests can lead to a denial-of-service (DoS) condition. Organizations using vulnerable Saleor versions are at risk of service disruption, potentially impacting business operations and revenue. Mitigation involves upgrading to the patched versions: 3.23.0a3, 3.22.47, 3.21.54, or 3.20.118.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Saleor e-commerce platform running a vulnerable version (2.0.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118).</li>
<li>The attacker crafts a malicious GraphQL query or mutation containing numerous aliased or chained operations. This is done to maximize server-side processing load.</li>
<li>The attacker sends the crafted GraphQL request to the Saleor platform&rsquo;s API endpoint, typically <code>/graphql/</code>.</li>
<li>The Saleor server attempts to process all the queries/mutations within the single request.</li>
<li>The server resources (CPU, memory, database connections) are rapidly consumed by the excessive processing demand.</li>
<li>The server becomes slow and unresponsive, potentially timing out for legitimate user requests.</li>
<li>The Saleor e-commerce platform experiences a denial-of-service condition, disrupting service for legitimate customers.</li>
<li>The attacker may repeat this process to maintain the denial-of-service state, further impacting business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35401 leads to resource exhaustion on the Saleor e-commerce platform, resulting in a denial-of-service condition. This disruption can impact online sales, customer experience, and brand reputation. The number of affected systems depends on the prevalence of vulnerable Saleor installations. While the exact number of victims is unknown, any e-commerce business using an unpatched version is susceptible to service outages. Prolonged or repeated attacks can lead to significant financial losses and damage to business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Saleor e-commerce platforms to versions 3.23.0a3, 3.22.47, 3.21.54, or 3.20.118 to patch CVE-2026-35401.</li>
<li>Implement rate limiting on the <code>/graphql/</code> API endpoint to mitigate the impact of excessive requests.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious GraphQL Volume</code> to identify potential exploitation attempts based on request patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-35401</category><category>graphql</category><category>resource-exhaustion</category><category>denial-of-service</category><category>saleor</category></item></channel></rss>