The latest documentation we've looked at from a few months ago shows the most recent versions they could exploit were before patches in 2022.
If the phone was unlocked with developer options enabled, then it's expected they can extract all of the data from the device. GrapheneOS primarily works on defending a locked device against data extraction, not an unlocked one, especially with developer options already enabled.
According to Cellebrite's documentation for Cellebrite Premium, they cannot exploit a locked GrapheneOS device. They can extract data from GrapheneOS if they either have your PIN/password or are given access to developer options for ADB. It's not our goal to stop that.
If they have the PIN/password they can also just use the system backup implementation to do a backup providing most of the data. Preventing extracting most data with the PIN/password would mean preventing the user having access to that data. It's also too much attack surface.