CVE-2025-68700 (CNNVD-202512-5500)
中文标题:
RAGFlow 安全漏洞
英文标题:
RAGFlow Remote Code Execution Vulnerability
漏洞描述
中文描述:
RAGFlow是InfiniFlow开源的一个基于深度文档理解的开源 RAG 引擎。 RAGFlow 0.23.0之前版本存在安全漏洞,该漏洞源于前端Canvas CodeExec组件使用eval解析不受信任的数据且无过滤或沙箱隔离,可能导致任意系统命令执行。
英文描述:
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.23.0, a low-privileged authenticated user (normal login account) can execute arbitrary system commands on the server host process via the frontend Canvas CodeExec component, completely bypassing sandbox isolation. This occurs because untrusted data (stdout) is parsed using eval() with no filtering or sandboxing. The intended design was to "automatically convert string results into Python objects," but this effectively executes attacker-controlled code. Additional endpoints lack access control or contain inverted permission logic, significantly expanding the attack surface and enabling chained exploitation. Version 0.23.0 contains a patch for the issue.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| infiniflow | ragflow | < 0.23.0 | - | - |
cpe:2.3:a:infiniflow:ragflow:<_0.23.0:*:*:*:*:*:*:*
|
| infiniflow | ragflow | * | - | - |
cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
HIGHCVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-68700 |
2026-01-04 02:04:26 | 2026-01-12 02:12:31 |
| NVD | nvd_CVE-2025-68700 |
2026-01-07 03:00:03 | 2026-01-12 02:28:14 |
| CNNVD | cnnvd_CNNVD-202512-5500 |
2026-01-11 06:15:06 | 2026-01-12 02:38:10 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202512-5500
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']