CVE-2025-27135
Severity CVSS v4.0:
HIGH
Type:
CWE-89
SQL Injection
Publication date:
25/02/2025
Last modified:
22/04/2025
Description
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.
Impact
Base Score 4.0
8.90
Severity 4.0
HIGH
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | 0.15.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/infiniflow/ragflow/blob/v0.15.1/agent/component/exesql.py
- https://github.com/infiniflow/ragflow/security/advisories/GHSA-3gqj-66qm-25jq
- https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42?pvs=4
- https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42



