attack 2026

KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation

Qizhi Chen , Chao Qi , Yihong Huang , Muquan Li , Rongzheng Wang , Dongyang Zhang , Ke Qin , Shuang Liang

0 citations

α

Published on arXiv

2603.11501

Data Poisoning Attack

OWASP ML Top 10 — ML02

Prompt Injection

OWASP LLM Top 10 — LLM01

Key Finding

KEPo achieves state-of-the-art attack success rates on GraphRAG for both single-target and multi-target scenarios, significantly outperforming prior RAG poisoning methods that fail against GraphRAG's KG abstraction layer.

KEPo (Knowledge Evolution Poison)

Novel technique introduced


Graph-based Retrieval-Augmented Generation (GraphRAG) constructs the Knowledge Graph (KG) from external databases to enhance the timeliness and accuracy of Large Language Model (LLM) generations.However,this reliance on external data introduces new attack surfaces.Attackers can inject poisoned texts into databases to manipulate LLMs into producing harmful target responses for attacker-chosen queries.Existing research primarily focuses on attacking conventional RAG systems.However,such methods are ineffective against GraphRAG.This robustness derives from the KG abstraction of GraphRAG,which reorganizes injected text into a graph before retrieval,thereby enabling the LLM to reason based on the restructured context instead of raw poisoned passages.To expose latent security vulnerabilities in GraphRAG,we propose Knowledge Evolution Poison (KEPo),a novel poisoning attack method specifically designed for GraphRAG.For each target query,KEPo first generates a toxic event containing poisoned knowledge based on the target answer.By fabricating event backgrounds and forging knowledge evolution paths from original facts to the toxic event,it then poisons the KG and misleads the LLM into treating the poisoned knowledge as the final result.In multi-target attack scenarios,KEPo further connects multiple attack corpora,enabling their poisoned knowledge to mutually reinforce while expanding the scale of poisoned communities,thereby amplifying attack effectiveness.Experimental results across multiple datasets demonstrate that KEPo achieves state-of-the-art attack success rates for both single-target and multi-target attacks,significantly outperforming previous methods.


Key Contributions

  • KEPo: a novel GraphRAG-specific poisoning attack that fabricates knowledge evolution paths from legitimate facts to toxic events, bypassing GraphRAG's KG-abstraction defense that neutralizes conventional RAG poisoning methods.
  • A multi-target attack variant that interconnects multiple poisoned corpora so their injected knowledge communities mutually reinforce each other, amplifying attack scale and effectiveness.
  • Empirical demonstration that existing RAG poisoning methods (semantic replacement, prompt injection, RAG-specific adversarial texts) are ineffective against GraphRAG's graph-restructuring layer, while KEPo achieves SOTA success rates.

🛡️ Threat Analysis

Data Poisoning Attack

KEPo's core mechanism is injecting poisoned text into external databases that GraphRAG ingests, corrupting the knowledge graph construction — a form of data injection/poisoning targeting the data pipeline the model relies on for generation.


Details

Domains
nlpgraph
Model Types
llm
Threat Tags
black_boxinference_timetargeted
Applications
graphrag systemsllm question answeringknowledge graph-enhanced generation