CVE-2025-25282

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-25282
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25282.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-25282
Aliases
  • GHSA-wc5v-g79p-7hch
Published
2025-02-21T21:04:34Z
Modified
2025-10-22T18:45:03.657041Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Potential Insecure Direct Object Reference (IDOR) vulnerability in ragflow
Details

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.

Database specific
{
    "cwe_ids": [
        "CWE-639"
    ]
}
References

Affected packages

Git / github.com/infiniflow/ragflow

Affected ranges

Type
GIT
Repo
https://github.com/infiniflow/ragflow
Events

Affected versions

v0.*

v0.13.0
v0.14.0