CVE-2025-27135 – RAGFlow SQL Injection Vulnerability

The following table lists the changes that have been made to the
CVE-2025-27135 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 25, 2025

    Action Type Old Value New Value
    Added Description RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-89
    Added Reference https://github.com/infiniflow/ragflow/blob/v0.15.1/agent/component/exesql.py
    Added Reference https://github.com/infiniflow/ragflow/security/advisories/GHSA-3gqj-66qm-25jq
    Added Reference https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42?pvs=4
  • CVE Modified
    by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Feb. 25, 2025

    Action Type Old Value New Value
    Added Reference https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42
Share the Post:

Related Posts