First published: Fri Feb 21 2025(Updated: )
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25282 is classified as a medium severity vulnerability due to potential unauthorized access risks.
To fix CVE-2025-25282, implement proper access controls to prevent unauthorized cross-tenant access.
CVE-2025-25282 specifically affects the RAGFlow open-source engine.
An authenticated user can exploit CVE-2025-25282 through Insecure Direct Object Reference techniques.
Exploiting CVE-2025-25282 can lead to unauthorized access to tenant user accounts and sensitive data.