CVE-2026-33286: Graphiti Affected by Arbitrary Method Execution via Unvalidated Relationship Names
(updated )
An arbitrary method execution vulnerability has been found which affects Graphiti’s JSONAPI write functionality. An attacker can craft a malicious JSONAPI payload with arbitrary relationship names to invoke any public method on the underlying model instance, class or its associations.
References
- github.com/advisories/GHSA-3m5v-4xp5-gjg2
- github.com/graphiti-api/graphiti
- github.com/graphiti-api/graphiti/commit/ddb5ad2b69330774bd1a47935ed89a9fe4396a54
- github.com/graphiti-api/graphiti/releases/tag/v1.10.2
- github.com/graphiti-api/graphiti/security/advisories/GHSA-3m5v-4xp5-gjg2
- github.com/rubysec/ruby-advisory-db/blob/master/gems/graphiti/CVE-2026-33286.yml
- nvd.nist.gov/vuln/detail/CVE-2026-33286
Code Behaviors & Features
Detect and mitigate CVE-2026-33286 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →