The GetRelationships API in Ory Keto is vulnerable to SQL injection due to flaws in its pagination implementation.
Pagination tokens are encrypted using the secret configured in secrets.pagination. An attacker who knows this secret can craft their own tokens, including malicious tokens that lead to SQL injection. If this configuration value is not set, Keto falls back to a hard-coded default pagination encryption secret. Because this default value is publicly known, attackers can generate valid and malicious pagination tokens manually for installations where this secret is not set.
This issue can be exploited when all of the following conditions are met:
secrets.pagination is not set or known to the attackerAn attacker can execute arbitrary SQL queries through forged pagination tokens.
As a first line of defense, immediately configure a custom value for secrets.pagination by generating a cryptographically secure random secret, for example:
openssl rand -base64 32
Next, upgrade Keto to a fixed version as soon as possible.
{
"github_reviewed": true,
"github_reviewed_at": "2026-03-20T20:55:44Z",
"severity": "HIGH",
"nvd_published_at": "2026-03-26T19:17:04Z",
"cwe_ids": [
"CWE-89"
]
}