RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 21 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix. | |
Title | Potential Insecure Direct Object Reference (IDOR) vulnerability in ragflow | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-24T14:49:12.014Z
Reserved: 2025-02-06T17:13:33.121Z
Link: CVE-2025-25282

Updated: 2025-02-24T14:49:08.521Z

Status : Received
Published: 2025-02-21T21:15:23.590
Modified: 2025-02-24T15:15:13.620
Link: CVE-2025-25282

No data.