Description
Graphiti is a framework for building and querying temporal context graphs for AI agents. Graphiti versions before 0.28.2 contained a Cypher injection vulnerability in shared search-filter construction for non-Kuzu backends. Attacker-controlled label values supplied through SearchFilters.node_labels were concatenated directly into Cypher label expressions without validation. In MCP deployments, this was exploitable not only through direct untrusted access to the Graphiti MCP server, but also through prompt injection against an LLM client that could be induced to call search_nodes with attacker-controlled entity_types values. The MCP server mapped entity_types to SearchFilters.node_labels, which then reached the vulnerable Cypher construction path. Affected backends included Neo4j, FalkorDB, and Neptune. Kuzu was not affected by the label-injection issue because it used parameterized label handling rather than string-interpolated Cypher labels. This issue was mitigated in 0.28.2.
Published: 2026-03-12
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Cypher Injection leading to data compromise
Action: Immediate Patch
AI Analysis

Impact

Graphiti is a framework for building and querying temporal context graphs for AI agents. Versions before 0.28.2 of the framework performed unsafe string concatenation of attacker‑controlled label values supplied through SearchFilters.node_labels directly into Cypher label expressions. This allows a Cypher injection flaw that can be used to execute arbitrary Cypher statements, potentially reading, modifying or deleting data in the underlying graph database. The vulnerability is rooted in a CWE‑943 weakness, an unsafe use of user input in query construction.

Affected Systems

Any deployment of Getzep Graphiti using a version older than 0.28.2 that interacts with non‑Kuzu backends (Neo4j, FalkorDB, or Amazon Neptune) is affected. The flaw is triggered when SearchFilters.node_labels contain unsanitized values; it can be exploited via direct API access to the Graphiti MCP server or through prompt injection against an LLM client that causes the client to invoke search_nodes with attacker‑controlled entity_types that are mapped to node_labels. Deployments using the Kuzu backend are not vulnerable because Kuzu uses parameterized label handling.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity vulnerability. The EPSS score of less than 1% suggests a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote – an attacker must be able to supply arbitrary node_labels through the public API or to induce the LLM client to send malicious prompt data. Because the flaw permits arbitrary query construction, an attacker could gain data confidentiality, integrity, or availability compromise of the graph database. The overall risk profile is high severity but low exploitation probability.

Generated by OpenCVE AI on March 18, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Graphiti to version 0.28.2 or later, which removes the unsafe string interpolation of node_labels.

Generated by OpenCVE AI on March 18, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gg5m-55jj-8m5g Graphiti vulnerable to Cypher Injection via unsanitized node_labels in search filters
History

Wed, 18 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:getzep:graphiti:*:*:*:*:*:*:*:*

Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Getzep
Getzep graphiti
Vendors & Products Getzep
Getzep graphiti

Thu, 12 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Description Graphiti is a framework for building and querying temporal context graphs for AI agents. Graphiti versions before 0.28.2 contained a Cypher injection vulnerability in shared search-filter construction for non-Kuzu backends. Attacker-controlled label values supplied through SearchFilters.node_labels were concatenated directly into Cypher label expressions without validation. In MCP deployments, this was exploitable not only through direct untrusted access to the Graphiti MCP server, but also through prompt injection against an LLM client that could be induced to call search_nodes with attacker-controlled entity_types values. The MCP server mapped entity_types to SearchFilters.node_labels, which then reached the vulnerable Cypher construction path. Affected backends included Neo4j, FalkorDB, and Neptune. Kuzu was not affected by the label-injection issue because it used parameterized label handling rather than string-interpolated Cypher labels. This issue was mitigated in 0.28.2.
Title Graphiti vulnerable to Cypher Injection via unsanitized node_labels in search filters
Weaknesses CWE-943
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:17:58.625Z

Reserved: 2026-03-11T14:47:05.685Z

Link: CVE-2026-32247

cve-icon Vulnrichment

Updated: 2026-03-13T16:17:54.664Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T19:16:19.733

Modified: 2026-03-18T14:38:09.717

Link: CVE-2026-32247

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:54:57Z

Weaknesses