RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Infiniflow
Infiniflow ragflow |
|
| CPEs | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Infiniflow
Infiniflow ragflow |
Mon, 24 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix. | |
| Title | Potential Insecure Direct Object Reference (IDOR) vulnerability in ragflow | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-21T21:04:34.731Z
Updated: 2025-02-24T14:49:12.014Z
Reserved: 2025-02-06T17:13:33.121Z
Link: CVE-2025-25282
Updated: 2025-02-24T14:49:08.521Z
Status : Analyzed
Published: 2025-02-21T21:15:23.590
Modified: 2025-07-16T14:24:03.717
Link: CVE-2025-25282
No data.