RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.
References
| Link | Resource |
|---|---|
| https://github.com/infiniflow/ragflow/security/advisories/GHSA-wc5v-g79p-7hch | Exploit Vendor Advisory |
| https://github.com/infiniflow/ragflow/security/advisories/GHSA-wc5v-g79p-7hch | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-02-21 21:15
Updated : 2025-07-16 14:24
NVD link : CVE-2025-25282
Mitre link : CVE-2025-25282
CVE.ORG link : CVE-2025-25282
JSON object : View
Products Affected
infiniflow
- ragflow
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
