Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5395 | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 22 Apr 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Infiniflow
Infiniflow ragflow |
|
| CPEs | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Infiniflow
Infiniflow ragflow |
|
| Metrics |
cvssV3_1
|
Tue, 25 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Tue, 25 Feb 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available. | |
| Title | RAGFlow SQL Injection vulnerability | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-25T18:57:33.672Z
Reserved: 2025-02-19T16:30:47.774Z
Link: CVE-2025-27135
Updated: 2025-02-25T18:57:28.323Z
Status : Analyzed
Published: 2025-02-25T19:15:15.677
Modified: 2025-04-22T12:57:00.213
Link: CVE-2025-27135
No data.
OpenCVE Enrichment
No data.
EUVD