VYPR
High severityNVD Advisory· Published Aug 21, 2023· Updated Oct 7, 2024

CVE-2023-38976

CVE-2023-38976

Description

An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Weaviate v1.20.0 allows remote attackers to cause denial of service via the handleUnbatchedGraphQLRequest function.

Vulnerability

CVE-2023-38976 is a denial of service (DoS) vulnerability in Weaviate, an open-source vector database [1]. It affects version 1.20.0 and stems from a flaw in the handleUnbatchedGraphQLRequest function, which can be triggered remotely without authentication.

Exploitation

An attacker can exploit this vulnerability by sending a specially crafted GraphQL request to the vulnerable endpoint. The attack requires network access to the Weaviate instance but no pre-existing credentials [2]. The function fails to properly handle certain malformed or high-load requests, leading to resource exhaustion.

Impact

Successful exploitation results in a denial of service, causing the Weaviate server to become unresponsive or crash. This can disrupt applications relying on the database for vector search and data retrieval, impacting availability.

Mitigation

The vulnerability has been patched in Weaviate versions 1.18.6 [3] and 1.19.13 [4]. Users running version 1.20.0 should upgrade to the latest patched release immediately. No workarounds are documented.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/weaviate/weaviateGo
>= 1.20.0, < 1.20.61.20.6
github.com/weaviate/weaviateGo
>= 1.19.0, < 1.19.131.19.13
github.com/weaviate/weaviateGo
< 1.18.61.18.6

Affected products

4

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

10

News mentions

0

No linked articles in our index yet.