CVE-2025-59845
Description
Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. The vulnerability arises from missing origin validation in the client-side code that handles window.postMessage events. A malicious website can send forged messages to the embedding page, causing the victim’s browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim’s cookies. This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@apollo/sandboxnpm | < 2.7.2 | 2.7.2 |
@apollo/explorernpm | < 3.7.3 | 3.7.3 |
Affected products
1- Range: @apollo/explorer-helpers@0.1.0, @apollo/explorer-helpers@0.1.1, @apollo/explorer-helpers@0.1.2, …
Patches
1e6d760d1635bMerge pull request #330 from apollographql/changeset-release/main
5 files changed · +14 −8
.changeset/great-bats-fly.md+0 −6 removed@@ -1,6 +0,0 @@ ---- -'@apollo/explorer': patch -'@apollo/sandbox': patch ---- - -fix a CSRF vulnerability that allowed attackers to pass through authenticated cookies though postMessage requests
packages/explorer/CHANGELOG.md+6 −0 modified@@ -1,5 +1,11 @@ # @apollo/explorer +## 3.7.3 + +### Patch Changes + +- [#329](https://github.com/apollographql/embeddable-explorer/pull/329) [`8c7be6b`](https://github.com/apollographql/embeddable-explorer/commit/8c7be6b4ffcf8f76287fc01d43b210073d571fd6) Thanks [@esilverm](https://github.com/esilverm)! - fix a CSRF vulnerability that allowed attackers to pass through authenticated cookies though postMessage requests + ## 3.7.2 ### Patch Changes
packages/explorer/package.json+1 −1 modified@@ -1,6 +1,6 @@ { "name": "@apollo/explorer", - "version": "3.7.2", + "version": "3.7.3", "author": "packages@apollographql.com", "license": "MIT", "repository": {
packages/sandbox/CHANGELOG.md+6 −0 modified@@ -1,5 +1,11 @@ # @apollo/sandbox +## 2.7.2 + +### Patch Changes + +- [#329](https://github.com/apollographql/embeddable-explorer/pull/329) [`8c7be6b`](https://github.com/apollographql/embeddable-explorer/commit/8c7be6b4ffcf8f76287fc01d43b210073d571fd6) Thanks [@esilverm](https://github.com/esilverm)! - fix a CSRF vulnerability that allowed attackers to pass through authenticated cookies though postMessage requests + ## 2.7.1 ### Patch Changes
packages/sandbox/package.json+1 −1 modified@@ -1,6 +1,6 @@ { "name": "@apollo/sandbox", - "version": "2.7.1", + "version": "2.7.2", "author": "packages@apollographql.com", "license": "MIT", "repository": {
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.