CVE-2026-32247: Cypher Injection in Graphiti via Insecure SearchFilter Interpolation
Vulnerability ID: CVE-2026-32247
CVSS Score: 8.1
Published: 2026-03-12
Graphiti versions prior to 0.28.2 contain a high-severity Cypher injection vulnerability (CWE-943) in the search-filter construction logic for non-Kuzu backends. This flaw permits an attacker to execute arbitrary Cypher queries against the underlying database, either directly or via indirect prompt injection in Model Context Protocol (MCP) deployments.
TL;DR
A Cypher injection flaw in Graphiti < 0.28.2 allows low-privileged attackers to execute arbitrary database queries against Neo4j, FalkorDB, and Neptune backends via unsanitized search filters.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-943
- Attack Vector: Network
- CVSS Score: 8.1 (High)
- Impact: High Confidentiality, High Integrity
- Exploit Status: PoC Available
- CISA KEV Status: Not Listed
Affected Systems
- Graphiti API components
- Graphiti MCP Server
- Neo4j Backend Deployments
- FalkorDB Backend Deployments
- Neptune Backend Deployments
-
getzep/graphiti: < 0.28.2 (Fixed in:
0.28.2)
Code Analysis
Commit: 7d65d5e
Implement regex-based validation for Cypher identifiers to prevent injection.
Exploit Details
- Regression Test PoC: PoC payloads demonstrating breakout and execution of DETACH DELETE via unvalidated labels.
Mitigation Strategies
- Upgrade Graphiti to version 0.28.2 or later.
- Apply the principle of least privilege to database service accounts, restricting destructive Cypher operations.
- Implement intermediate validation layers for LLM tool-calling in MCP deployments.
- Monitor database query logs for anomalous Cypher structures or comment markers.
Remediation Steps:
- Identify all deployments of getzep/graphiti across the infrastructure.
- Update the graphiti dependency in your environment via
pip install --upgrade graphiti>=0.28.2or equivalent package manager command. - Verify the application test suite passes and that search filters correctly reject non-alphanumeric inputs.
- Review graph database logs for historical indicators of exploitation using known payload patterns.
References
- GHSA-gg5m-55jj-8m5g: Cypher Injection in Graphiti
- Fix Commit 7d65d5e77e89a199a62d737634eaa26dbb04d037
- Pull Request 1312
- Graphiti Release v0.28.2
Read the full report for CVE-2026-32247 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)