LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-33286

CVE-2026-33286 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: March 25, 2026

Graphiti - Remote Code Execution

Published: March 24, 2026Updated: March 25, 2026Remote Exploitable

Overview

Graphiti < 1.10.2 contains an arbitrary method execution vulnerability caused by unvalidated relationship names in JSONAPI write payloads, letting attackers invoke any public method on model instances or classes, exploit requires access to write endpoints.

Severity & Score

Severity: Critical
CVSS Score: 9.1
EPSS Score: 4.3%(Probability of exploitation in next 30 days)

Impact

Attackers can execute arbitrary public methods on models, potentially causing data destruction or unauthorized actions.

Mitigation

Upgrade to Graphiti version 1.10.2 or later.

Social Media Activity(1 post)

Yazoul - Cybersecurity Alerts
Yazoul - Cybersecurity Alerts
@Matchbook3469
Mar 26, 2026

🔴 New security advisory: CVE-2026-33286 affects multiple systems. • Impact: Remote code execution or complete system compromise possible • Risk: Attackers can gain full control of affected systems • Mitigation: Patch immediately or isolate affected systems Full breakdown: https://www.yazoul.net/advisory/cve/cve-2026-33286-graphiti-arbitrary-method-execution #Cybersecurity #ZeroDay #ThreatIntel

View original post

Details

CVE ID
CVE-2026-33286
Severity
Critical
CVSS Score
9.1
Type
undefined
Status
confirmed
EPSS
4.3%
Social Posts
1

CWE

  • CWE-913

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

EPSS Score

4.3%Probability of exploitation in the next 30 days