Critical (9.1)

CVE-2026-33286: Graphiti RCE — Critical — Patch Now

CVE-2026-33286

Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti'...

Overview

A critical security vulnerability has been discovered in Graphiti, a popular framework for building JSON:API-compliant interfaces on top of Ruby on Rails models. This flaw, tracked as CVE-2026-33286, allows an attacker to execute arbitrary public methods on your application’s underlying data models through a malicious API request.

Vulnerability Details

In affected versions (prior to 1.10.2), Graphiti’s write functionality for creating, updating, or deleting resources does not properly validate relationship names supplied by users in JSONAPI payloads. The system incorrectly trusts this input and uses it to call methods directly on model instances and their associations via Ruby’s send method. This means an attacker can craft a request that calls any public method available on your models, bypassing intended application logic and security controls.

Impact and Risk

This vulnerability is rated CRITICAL with a CVSS score of 9.1. If your application exposes Graphiti write endpoints (like create or update) to untrusted users-even through a frontend application-an attacker could potentially:

  • Execute destructive database operations (e.g., destroy_all).
  • Invoke sensitive business logic methods not intended for API access.
  • Manipulate or exfiltrate data by calling getter methods on associated records.
  • Compromise the integrity and availability of your application data.

This type of vulnerability is a common vector for significant data breaches. For context on how such flaws can lead to incidents, you can review historical cases at breach reports.

Remediation and Mitigation

Primary Fix: Upgrade the Graphiti gem to version 1.10.2 or later immediately. This is the only complete solution.

Immediate Workarounds (if upgrade is delayed):

  1. Restrict Access: Ensure Graphiti write endpoints (create, update, destroy) are not accessible to unauthenticated or untrusted users. Implement strong authentication and authorization checks before processing any write operation.
  2. Parameter Filtering: Use Rails Strong Parameters or similar input validation to explicitly allow only known, safe parameters from API requests, stripping out any unexpected relationship data.

Conclusion

CVE-2026-33286 is a severe flaw that requires prompt action. Organizations using Graphiti should prioritize upgrading to the patched version. Regularly updating dependencies and conducting security reviews of API endpoints are essential practices to prevent such vulnerabilities. For the latest updates on critical vulnerabilities like this one, follow security news.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2026-33286?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.