RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Infiniflow
Infiniflow ragflow |
|
| CPEs | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Infiniflow
Infiniflow ragflow |
|
| Metrics |
cvssV3_1
|
Tue, 25 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Tue, 25 Feb 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available. | |
| Title | RAGFlow SQL Injection vulnerability | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-25T18:16:58.667Z
Updated: 2025-02-25T18:57:33.672Z
Reserved: 2025-02-19T16:30:47.774Z
Link: CVE-2025-27135
Updated: 2025-02-25T18:57:28.323Z
Status : Analyzed
Published: 2025-02-25T19:15:15.677
Modified: 2025-04-22T12:57:00.213
Link: CVE-2025-27135
No data.