CVE-2026-32247: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in getzep graphiti
CVE-2026-32247 is a high-severity Cypher injection vulnerability in getzep's Graphiti framework versions prior to 0. 28. 2. The flaw arises from improper neutralization of special elements in data query logic, specifically in the construction of Cypher label expressions for non-Kuzu backends like Neo4j, FalkorDB, and Neptune. Attackers can exploit this by injecting malicious label values through SearchFilters. node_labels or via prompt injection against LLM clients that trigger vulnerable search_nodes calls. This can lead to unauthorized data access and compromise of confidentiality and integrity without requiring user interaction, though some privileges are needed. The issue was fixed in version 0. 28. 2 by improving input validation and parameterization.
AI Analysis
Technical Summary
Graphiti is a framework designed for building and querying temporal context graphs to support AI agents. Versions of Graphiti before 0.28.2 contain a Cypher injection vulnerability (CVE-2026-32247) classified under CWE-943 (Improper Neutralization of Special Elements in Data Query Logic). The vulnerability exists in the way Graphiti constructs Cypher queries for non-Kuzu backends (Neo4j, FalkorDB, and Neptune). Specifically, attacker-controlled label values supplied via SearchFilters.node_labels are concatenated directly into Cypher label expressions without proper validation or sanitization, enabling injection of malicious Cypher code. In MCP (Managed Context Provider) deployments, exploitation is possible not only through direct access to the Graphiti MCP server but also indirectly via prompt injection attacks against large language model (LLM) clients that invoke the vulnerable search_nodes function with attacker-controlled entity_types. The MCP server maps entity_types to SearchFilters.node_labels, which then reach the vulnerable query construction path. Kuzu backend is not affected due to its use of parameterized label handling instead of string interpolation. The vulnerability allows attackers with at least low privileges (PR:L) to execute unauthorized Cypher queries, potentially exposing or manipulating sensitive graph data, impacting confidentiality and integrity but not availability. The issue was mitigated in Graphiti version 0.28.2 by implementing proper input validation and parameterization to neutralize special elements in Cypher queries.
Potential Impact
This vulnerability poses a significant risk to organizations relying on Graphiti with non-Kuzu backends for AI-driven graph data querying. Successful exploitation can lead to unauthorized access to sensitive graph data, data leakage, and potential data manipulation, undermining confidentiality and integrity. Since the vulnerability does not impact availability, denial-of-service is less of a concern. The ease of exploitation is relatively high given that no user interaction is required and the attack surface includes both direct server access and indirect LLM prompt injection vectors. Organizations using vulnerable versions in MCP deployments face compounded risk due to the indirect exploitation path via LLM clients. The scope includes any organization leveraging Graphiti with Neo4j, FalkorDB, or Neptune backends, particularly those integrating AI agents and large language models. This could affect sectors such as technology, finance, healthcare, and government, where graph databases and AI are increasingly prevalent. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks.
Mitigation Recommendations
Organizations should immediately upgrade Graphiti to version 0.28.2 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict input validation and sanitization on all user-controllable inputs that influence Cypher query construction, especially SearchFilters.node_labels and entity_types parameters. Employ parameterized queries or prepared statements wherever possible to avoid string interpolation of labels. Restrict access to the Graphiti MCP server to trusted users and networks to reduce direct exploitation risk. Monitor and audit LLM client interactions that invoke search_nodes for anomalous or unexpected entity_types inputs indicative of prompt injection attempts. Implement network segmentation and least privilege principles to limit attacker movement if compromise occurs. Maintain up-to-date threat intelligence and apply security patches promptly. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block Cypher injection patterns targeting Graphiti endpoints.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Netherlands, Japan, South Korea, Australia, Singapore
CVE-2026-32247: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in getzep graphiti
Description
CVE-2026-32247 is a high-severity Cypher injection vulnerability in getzep's Graphiti framework versions prior to 0. 28. 2. The flaw arises from improper neutralization of special elements in data query logic, specifically in the construction of Cypher label expressions for non-Kuzu backends like Neo4j, FalkorDB, and Neptune. Attackers can exploit this by injecting malicious label values through SearchFilters. node_labels or via prompt injection against LLM clients that trigger vulnerable search_nodes calls. This can lead to unauthorized data access and compromise of confidentiality and integrity without requiring user interaction, though some privileges are needed. The issue was fixed in version 0. 28. 2 by improving input validation and parameterization.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Graphiti is a framework designed for building and querying temporal context graphs to support AI agents. Versions of Graphiti before 0.28.2 contain a Cypher injection vulnerability (CVE-2026-32247) classified under CWE-943 (Improper Neutralization of Special Elements in Data Query Logic). The vulnerability exists in the way Graphiti constructs Cypher queries for non-Kuzu backends (Neo4j, FalkorDB, and Neptune). Specifically, attacker-controlled label values supplied via SearchFilters.node_labels are concatenated directly into Cypher label expressions without proper validation or sanitization, enabling injection of malicious Cypher code. In MCP (Managed Context Provider) deployments, exploitation is possible not only through direct access to the Graphiti MCP server but also indirectly via prompt injection attacks against large language model (LLM) clients that invoke the vulnerable search_nodes function with attacker-controlled entity_types. The MCP server maps entity_types to SearchFilters.node_labels, which then reach the vulnerable query construction path. Kuzu backend is not affected due to its use of parameterized label handling instead of string interpolation. The vulnerability allows attackers with at least low privileges (PR:L) to execute unauthorized Cypher queries, potentially exposing or manipulating sensitive graph data, impacting confidentiality and integrity but not availability. The issue was mitigated in Graphiti version 0.28.2 by implementing proper input validation and parameterization to neutralize special elements in Cypher queries.
Potential Impact
This vulnerability poses a significant risk to organizations relying on Graphiti with non-Kuzu backends for AI-driven graph data querying. Successful exploitation can lead to unauthorized access to sensitive graph data, data leakage, and potential data manipulation, undermining confidentiality and integrity. Since the vulnerability does not impact availability, denial-of-service is less of a concern. The ease of exploitation is relatively high given that no user interaction is required and the attack surface includes both direct server access and indirect LLM prompt injection vectors. Organizations using vulnerable versions in MCP deployments face compounded risk due to the indirect exploitation path via LLM clients. The scope includes any organization leveraging Graphiti with Neo4j, FalkorDB, or Neptune backends, particularly those integrating AI agents and large language models. This could affect sectors such as technology, finance, healthcare, and government, where graph databases and AI are increasingly prevalent. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks.
Mitigation Recommendations
Organizations should immediately upgrade Graphiti to version 0.28.2 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict input validation and sanitization on all user-controllable inputs that influence Cypher query construction, especially SearchFilters.node_labels and entity_types parameters. Employ parameterized queries or prepared statements wherever possible to avoid string interpolation of labels. Restrict access to the Graphiti MCP server to trusted users and networks to reduce direct exploitation risk. Monitor and audit LLM client interactions that invoke search_nodes for anomalous or unexpected entity_types inputs indicative of prompt injection attempts. Implement network segmentation and least privilege principles to limit attacker movement if compromise occurs. Maintain up-to-date threat intelligence and apply security patches promptly. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block Cypher injection patterns targeting Graphiti endpoints.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-11T14:47:05.685Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b3294c2f860ef943f62e03
Added to database: 3/12/2026, 8:59:56 PM
Last enriched: 3/20/2026, 2:35:11 AM
Last updated: 4/27/2026, 1:23:09 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.