RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.
References
Configurations
History
22 Apr 2025, 12:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Infiniflow
Infiniflow ragflow |
|
Summary |
|
|
CPE | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/infiniflow/ragflow/blob/v0.15.1/agent/component/exesql.py - Product | |
References | () https://github.com/infiniflow/ragflow/security/advisories/GHSA-3gqj-66qm-25jq - Vendor Advisory | |
References | () https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42?pvs=4 - Exploit | |
References | () https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42 - Exploit |
25 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-25 19:15
Updated : 2025-04-22 12:57
NVD link : CVE-2025-27135
Mitre link : CVE-2025-27135
CVE.ORG link : CVE-2025-27135
JSON object : View
Products Affected
infiniflow
- ragflow
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')