๐Ÿ” CVE Alert

CVE-2026-33286

CRITICAL 9.1

Graphiti Affected by Arbitrary Method Execution via Unvalidated Relationship Names

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
12th

Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti's JSONAPI write functionality. An attacker can craft a malicious JSONAPI payload with arbitrary relationship names to invoke any public method on the underlying model instance, class or its associations. Any application exposing Graphiti write endpoints (create/update/delete) to untrusted users is affected. The `Graphiti::Util::ValidationResponse#all_valid?` method recursively calls `model.send(name)` using relationship names taken directly from user-supplied JSONAPI payloads, without validating them against the resource's configured sideloads. This allows an attacker to potentially run any public method on a given model instance, on the instance class or associated instances or classes, including destructive operations. This is patched in Graphiti v1.10.2. Users should upgrade as soon as possible. Some workarounds are available. Ensure Graphiti write endpoints (create/update) are not accessible to untrusted users and/or apply strong authentication and authorization checks before any write operation is processed, for example use Rails strong parameters to ensure only valid parameters are processed.

CWE CWE-913
Vendor graphiti-api
Product graphiti
Published Mar 23, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for graphiti-api graphiti

Be the first to know when new critical vulnerabilities affecting graphiti-api graphiti are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

graphiti-api / graphiti
< 1.10.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/graphiti-api/graphiti/security/advisories/GHSA-3m5v-4xp5-gjg2 github.com: https://github.com/graphiti-api/graphiti/commit/ddb5ad2b69330774bd1a47935ed89a9fe4396a54 github.com: https://github.com/graphiti-api/graphiti/releases/tag/v1.10.2