The following table lists the changes that have been made to the
CVE-2025-27135 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Feb. 25, 2025
Action Type Old Value New Value Added Description RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available. Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Added CWE CWE-89 Added Reference https://github.com/infiniflow/ragflow/blob/v0.15.1/agent/component/exesql.py Added Reference https://github.com/infiniflow/ragflow/security/advisories/GHSA-3gqj-66qm-25jq Added Reference https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42?pvs=4 -
CVE Modified
by 134c704f-9b21-4f2e-91b3-4a467353bcc0Feb. 25, 2025
Action Type Old Value New Value Added Reference https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42