Description
Your web application's GraphQL implementation accepts non-JSON mutations over GET requests, increasing the risk of Cross-Site Request Forgery (CSRF) attacks. While JSON-based POST requests are generally considered resistant to CSRF, non-JSON GET requests are more susceptible to this type of attacks. GraphQL mutations are operations used to modify data on the server-side in a GraphQL API. While queries are used to request data from a GraphQL server, mutations are used to create, update, or delete data.
Remediation
Use POST for Mutations: Restrict GraphQL mutations to JSON-based POST requests to limit the CSRF attack surface.
References
Related Vulnerabilities
WordPress Plugin WP Fastest Cache Multiple Vulnerabilities (0.9.4)
WordPress Plugin Responsive Menu-Create Mobile-Friendly Menu Multiple Vulnerabilities (4.0.3)
Spring Boot Misconfiguration: H2 console enabled
WordPress Plugin Style Kits-Advanced Theme Styles for Elementor Cross-Site Request Forgery (1.8.0)
WordPress Plugin WP Activity Log Cross-Site Request Forgery (4.1.3.2)