RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.
References
Configurations
No configuration.
History
24 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/infiniflow/ragflow/security/advisories/GHSA-wc5v-g79p-7hch - | |
Summary |
|
21 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-21 21:15
Updated : 2025-02-24 15:15
NVD link : CVE-2025-25282
Mitre link : CVE-2025-25282
CVE.ORG link : CVE-2025-25282
JSON object : View
Products Affected
No product.
CWE
CWE-639
Authorization Bypass Through User-Controlled Key