CVE-2026-24770
- EPSS 0.68%
- Veröffentlicht 27.01.2026 21:51:44
- Zuletzt bearbeitet 30.01.2026 21:53:46
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading to...
CVE-2025-69286
- EPSS 0.09%
- Veröffentlicht 31.12.2025 21:52:54
- Zuletzt bearbeitet 06.01.2026 16:47:58
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.22.0, the use of an insecure key generation algorithm in the API key and beta (assistant/agent share auth) token generation process allows these tokens to b...
CVE-2025-68700
- EPSS 0.06%
- Veröffentlicht 31.12.2025 21:17:40
- Zuletzt bearbeitet 06.01.2026 18:02:07
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.23.0, a low-privileged authenticated user (normal login account) can execute arbitrary system commands on the server host process via the frontend Canvas Co...
CVE-2025-51462
- EPSS 0.05%
- Veröffentlicht 22.07.2025 00:00:00
- Zuletzt bearbeitet 09.10.2025 16:02:10
Stored Cross-site Scripting (XSS) vulnerability in api.apps.dialog_app.set_dialog in RAGFlow 0.17.2 allows remote attackers to execute arbitrary JavaScript via crafted input to the assistant greeting field, which is stored unsanitised and rendered us...
CVE-2025-48187
- EPSS 0.11%
- Veröffentlicht 17.05.2025 00:00:00
- Zuletzt bearbeitet 12.06.2025 16:29:12
RAGFlow through 0.18.1 allows account takeover because it is possible to conduct successful brute-force attacks against email verification codes to perform arbitrary account registration, login, and password reset. Codes are six digits and there is n...
CVE-2024-12779
- EPSS 0.1%
- Veröffentlicht 20.03.2025 10:11:28
- Zuletzt bearbeitet 01.04.2025 20:34:50
A Server-Side Request Forgery (SSRF) vulnerability exists in infiniflow/ragflow version 0.12.0. The vulnerability is present in the `POST /v1/llm/add_llm` and `POST /v1/conversation/tts` endpoints. Attackers can specify an arbitrary URL as the `api_b...
CVE-2024-12869
- EPSS 0.07%
- Veröffentlicht 20.03.2025 10:11:19
- Zuletzt bearbeitet 15.10.2025 13:15:40
In infiniflow/ragflow version v0.12.0, there is an improper authentication vulnerability that allows a user to view another user's invite list. This can lead to a privacy breach where users' personal or private information, such as email addresses or...
CVE-2024-12871
- EPSS 0.07%
- Veröffentlicht 20.03.2025 10:11:07
- Zuletzt bearbeitet 01.04.2025 20:34:33
An XSS vulnerability in infiniflow/ragflow version 0.12.0 allows an attacker to upload a malicious PDF file to the knowledge base. When the file is viewed within Ragflow, the payload is executed in the context of the user's browser. This can lead to ...
CVE-2024-12450
- EPSS 0.31%
- Veröffentlicht 20.03.2025 10:11:05
- Zuletzt bearbeitet 04.04.2025 09:15:15
In infiniflow/ragflow versions 0.12.0, the `web_crawl` function in `document_app.py` contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses ...
CVE-2024-12870
- EPSS 0.15%
- Veröffentlicht 20.03.2025 10:10:45
- Zuletzt bearbeitet 20.03.2025 10:15:31
A stored cross-site scripting (XSS) vulnerability exists in infiniflow/ragflow, affecting the latest commit on the main branch (cec2080). The vulnerability allows an attacker to upload HTML/XML files that can host arbitrary JavaScript payloads. These...