Cypher Injection Vulnerability in Graphiti Framework by Getzep
CVE-2026-32247
Key Information:
Badges
What is CVE-2026-32247?
Graphiti, a framework designed for building and querying temporal context graphs for AI agents, has a significant Cypher injection vulnerability present in versions prior to 0.28.2. The flaw arises in the shared construction of search filters, where attacker-controlled label values supplied through SearchFilters.node_labels are concatenated directly into Cypher label expressions, bypassing necessary validation. This vulnerability is exploitable via direct access to the Graphiti MCP server or through prompt injection on an LLM client, leading to potential manipulation of entity_types values. Affected backends include Neo4j, FalkorDB, and Neptune; however, Kuzu remains secure as it utilizes parameterized label handling. The issue has been addressed in version 0.28.2.
Affected Version(s)
graphiti < 0.28.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
