First published: Thu Mar 20 2025(Updated: )
A vulnerability in infiniflow/ragflow version RAGFlow-0.13.0 allows for partial account takeover via insecure data querying. The issue arises from the way tenant IDs are handled in the application. If a user has access to multiple tenants, they can manipulate their tenant access to query and access API tokens of other tenants. This vulnerability affects the following endpoints: /v1/system/token_list, /v1/system/new_token, /v1/api/token_list, /v1/api/new_token, and /v1/api/rm. An attacker can exploit this to access other tenants' API tokens, perform actions on behalf of other tenants, and access their data.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
RAGFlow |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-12880 is considered to be high due to its potential for partial account takeover.
To fix CVE-2024-12880, ensure proper validation and handling of tenant IDs to prevent insecure data querying.
CVE-2024-12880 affects infiniflow/ragflow version RAGFlow-0.13.0.
Yes, CVE-2024-12880 could lead to data breaches through unauthorized access to other tenants' data.
Currently, the recommended workaround for CVE-2024-12880 is to limit tenant access and review permissions until an official patch is released.