RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.
Metrics
Affected Vendors & Products
References
History
Tue, 22 Apr 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Infiniflow
Infiniflow ragflow |
|
CPEs | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
Vendors & Products |
Infiniflow
Infiniflow ragflow |
|
Metrics |
cvssV3_1
|
Tue, 25 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Tue, 25 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available. | |
Title | RAGFlow SQL Injection vulnerability | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-25T18:16:58.667Z
Updated: 2025-02-25T18:57:33.672Z
Reserved: 2025-02-19T16:30:47.774Z
Link: CVE-2025-27135

Updated: 2025-02-25T18:57:28.323Z

Status : Analyzed
Published: 2025-02-25T19:15:15.677
Modified: 2025-04-22T12:57:00.213
Link: CVE-2025-27135

No data.