| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3m5v-4xp5-gjg2 | Graphiti Affected by Arbitrary Method Execution via Unvalidated Relationship Names |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Graphiti-api
Graphiti-api graphiti |
|
| Vendors & Products |
Graphiti-api
Graphiti-api graphiti |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti's JSONAPI write functionality. An attacker can craft a malicious JSONAPI payload with arbitrary relationship names to invoke any public method on the underlying model instance, class or its associations. Any application exposing Graphiti write endpoints (create/update/delete) to untrusted users is affected. The `Graphiti::Util::ValidationResponse#all_valid?` method recursively calls `model.send(name)` using relationship names taken directly from user-supplied JSONAPI payloads, without validating them against the resource's configured sideloads. This allows an attacker to potentially run any public method on a given model instance, on the instance class or associated instances or classes, including destructive operations. This is patched in Graphiti v1.10.2. Users should upgrade as soon as possible. Some workarounds are available. Ensure Graphiti write endpoints (create/update) are not accessible to untrusted users and/or apply strong authentication and authorization checks before any write operation is processed, for example use Rails strong parameters to ensure only valid parameters are processed. | |
| Title | Graphiti Affected by Arbitrary Method Execution via Unvalidated Relationship Names | |
| Weaknesses | CWE-913 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T13:35:27.686Z
Reserved: 2026-03-18T18:55:47.426Z
Link: CVE-2026-33286
Updated: 2026-03-24T13:35:23.250Z
Status : Awaiting Analysis
Published: 2026-03-24T00:16:30.683
Modified: 2026-03-24T15:53:48.067
Link: CVE-2026-33286
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:29:42Z
Github GHSA