CVE-2026-33286: Graphiti RCE — Critical — Patch Now
CVE-2026-33286
Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti'...
Overview
A critical security vulnerability has been discovered in Graphiti, a popular framework for building JSON:API-compliant interfaces on top of Ruby on Rails models. This flaw, tracked as CVE-2026-33286, allows an attacker to execute arbitrary public methods on your application’s underlying data models through a malicious API request.
Vulnerability Details
In affected versions (prior to 1.10.2), Graphiti’s write functionality for creating, updating, or deleting resources does not properly validate relationship names supplied by users in JSONAPI payloads. The system incorrectly trusts this input and uses it to call methods directly on model instances and their associations via Ruby’s send method. This means an attacker can craft a request that calls any public method available on your models, bypassing intended application logic and security controls.
Impact and Risk
This vulnerability is rated CRITICAL with a CVSS score of 9.1. If your application exposes Graphiti write endpoints (like create or update) to untrusted users-even through a frontend application-an attacker could potentially:
- Execute destructive database operations (e.g.,
destroy_all). - Invoke sensitive business logic methods not intended for API access.
- Manipulate or exfiltrate data by calling getter methods on associated records.
- Compromise the integrity and availability of your application data.
This type of vulnerability is a common vector for significant data breaches. For context on how such flaws can lead to incidents, you can review historical cases at breach reports.
Remediation and Mitigation
Primary Fix: Upgrade the Graphiti gem to version 1.10.2 or later immediately. This is the only complete solution.
Immediate Workarounds (if upgrade is delayed):
- Restrict Access: Ensure Graphiti write endpoints (
create,update,destroy) are not accessible to unauthenticated or untrusted users. Implement strong authentication and authorization checks before processing any write operation. - Parameter Filtering: Use Rails Strong Parameters or similar input validation to explicitly allow only known, safe parameters from API requests, stripping out any unexpected relationship data.
Conclusion
CVE-2026-33286 is a severe flaw that requires prompt action. Organizations using Graphiti should prioritize upgrading to the patched version. Regularly updating dependencies and conducting security reviews of API endpoints are essential practices to prevent such vulnerabilities. For the latest updates on critical vulnerabilities like this one, follow security news.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33286?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScr...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...