CVE-2025-51462

Stored Cross-site Scripting (XSS) vulnerability in api.apps.dialog_app.set_dialog in RAGFlow 0.17.2 allows remote attackers to execute arbitrary JavaScript via crafted input to the assistant greeting field, which is stored unsanitised and rendered using a markdown component with rehype-raw.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:infiniflow:ragflow:0.17.2:*:*:*:*:*:*:*

History

09 Oct 2025, 16:02

Type Values Removed Values Added
CPE cpe:2.3:a:infiniflow:ragflow:0.17.2:*:*:*:*:*:*:*
First Time Infiniflow
Infiniflow ragflow
References () https://github.com/infiniflow/ragflow - () https://github.com/infiniflow/ragflow - Product
References () https://github.com/infiniflow/ragflow/pull/7250 - () https://github.com/infiniflow/ragflow/pull/7250 - Exploit, Issue Tracking
References () https://www.gecko.security/blog/cve-2025-51462 - () https://www.gecko.security/blog/cve-2025-51462 - Exploit, Third Party Advisory

25 Jul 2025, 15:29

Type Values Removed Values Added
Summary
  • (es) La vulnerabilidad de Cross-site Scripting (XSS) almacenado en api.apps.dialog_app.set_dialog en RAGFlow 0.17.2 permite a atacantes remotos ejecutar JavaScript arbitrario a través de una entrada manipulada para el campo de saludo del asistente, que se almacena sin depurar y se procesa utilizando un componente de rebajas con rehype-raw.

22 Jul 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-22 21:15

Updated : 2025-10-09 16:02


NVD link : CVE-2025-51462

Mitre link : CVE-2025-51462

CVE.ORG link : CVE-2025-51462


JSON object : View

Products Affected

infiniflow

  • ragflow
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')