Description

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.

INFO

Published Date :

2025-02-21T21:04:34.731Z

Last Modified :

2025-02-24T14:49:12.014Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-25282 vulnerability.

Vendors Products
Infiniflow
  • Ragflow
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-25282.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact