First published: Tue Feb 25 2025(Updated: )
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
RAGFlow | <0.15.1 | |
RAGFlow | <=0.15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27135 is classified as a high severity vulnerability due to its potential for SQL injection attacks.
To mitigate CVE-2025-27135, upgrade RAGFlow to a version higher than 0.15.1 once a patched version is available.
CVE-2025-27135 is a SQL injection vulnerability affecting the ExeSQL component of RAGFlow.
Versions of RAGFlow up to and including 0.15.1 are affected by CVE-2025-27135.
CVE-2025-27135 allows attackers to execute arbitrary SQL queries on the database, potentially compromising data integrity and security.