RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.
References
Configurations
History
22 Apr 2025, 12:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://github.com/infiniflow/ragflow/blob/v0.15.1/agent/component/exesql.py - Product | |
References | () https://github.com/infiniflow/ragflow/security/advisories/GHSA-3gqj-66qm-25jq - Vendor Advisory | |
References | () https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42?pvs=4 - Exploit | |
References | () https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42 - Exploit | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Infiniflow ragflow
Infiniflow |
25 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-25 19:15
Updated : 2025-04-22 12:57
NVD link : CVE-2025-27135
Mitre link : CVE-2025-27135
CVE.ORG link : CVE-2025-27135
JSON object : View
Products Affected
infiniflow
- ragflow
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')