CVE-2026-32247: Kritische Cypher-Injection in Graphiti Framework

⚠️ CVE-Referenzen: CVE-2026-32247

Zusammenfassung

Graphiti, ein Framework für KI-Agenten, hatte vor Version 0.28.2 eine Schwachstelle, die Cypher-Injection in Suchfiltern ermöglichte. Angreifer konnten über manipulierte Entitätstypen beliebigen Cypher-Code einschleusen. Dies betraf Backends wie Neo4j, FalkorDB und Neptune. Das Kuzu-Backend war nicht betroffen, da es parameterisierte Abfragen verwendete. Die Lücke wurde in Version 0.28.2 geschlossen.

Graphiti is a framework for building and querying temporal context graphs for AI agents. Graphiti versions before 0.28.2 contained a Cypher injection vulnerability in shared search-filter construction for non-Kuzu backends. Attacker-controlled label values supplied through SearchFilters.node_labels were concatenated directly into Cypher label expressions without validation. In MCP deployments, this was exploitable not only through direct untrusted access to the Graphiti MCP server, but also through prompt injection against an LLM client that could be induced to call search_nodes with attacker-controlled entity_types values. The MCP server mapped entity_types to SearchFilters.node_labels, which then reached the vulnerable Cypher construction path. Affected backends included Neo4j, FalkorDB, and Neptune. Kuzu was not affected by the label-injection issue because it used parameterized label handling rather than string-interpolated Cypher labels. This issue was mitigated in 0.28.2.
Quelle: app.opencve.io