CVE-2025-25282

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:*

History

16 Jul 2025, 14:24

Type Values Removed Values Added
References () https://github.com/infiniflow/ragflow/security/advisories/GHSA-wc5v-g79p-7hch - () https://github.com/infiniflow/ragflow/security/advisories/GHSA-wc5v-g79p-7hch - Exploit, Vendor Advisory
First Time Infiniflow
Infiniflow ragflow
CPE cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:*

24 Feb 2025, 15:15

Type Values Removed Values Added
CWE CWE-639

21 Feb 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-21 21:15

Updated : 2025-07-16 14:24


NVD link : CVE-2025-25282

Mitre link : CVE-2025-25282


JSON object : View

Products Affected

infiniflow

  • ragflow
CWE

No CWE.