CVE-2026-33286 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: March 25, 2026
Graphiti - Remote Code Execution
Overview
Graphiti < 1.10.2 contains an arbitrary method execution vulnerability caused by unvalidated relationship names in JSONAPI write payloads, letting attackers invoke any public method on model instances or classes, exploit requires access to write endpoints.
Severity & Score
Impact
Attackers can execute arbitrary public methods on models, potentially causing data destruction or unauthorized actions.
Mitigation
Upgrade to Graphiti version 1.10.2 or later.
References
Social Media Activity(1 post)
🔴 New security advisory: CVE-2026-33286 affects multiple systems. • Impact: Remote code execution or complete system compromise possible • Risk: Attackers can gain full control of affected systems • Mitigation: Patch immediately or isolate affected systems Full breakdown: https://www.yazoul.net/advisory/cve/cve-2026-33286-graphiti-arbitrary-method-execution #Cybersecurity #ZeroDay #ThreatIntel
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33286
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- undefined
- Status
- confirmed
- EPSS
- 4.3%
- Social Posts
- 1
CWE
- CWE-913
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H