Home

Description

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.22.0, the use of an insecure key generation algorithm in the API key and beta (assistant/agent share auth) token generation process allows these tokens to be mutually derivable. Specifically, both tokens are generated using the same `URLSafeTimedSerializer` with predictable inputs, enabling an unauthorized user who obtains the shared assistant/agent URL to derive the personal API key. This grants them full control over the assistant/agent owner's account. Version 0.22.0 fixes the issue.

PUBLISHED Reserved 2025-12-31 | Published 2025-12-31 | Updated 2026-01-02 | Assigner GitHub_M




HIGH: 8.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-340: Generation of Predictable Numbers or Identifiers

Product status

< 0.22.0
affected

References

github.com/...agflow/security/advisories/GHSA-9j5g-g4xm-57w7 exploit

github.com/...agflow/security/advisories/GHSA-9j5g-g4xm-57w7

github.com/...ommit/a3bb4aadcc3494fb27f2a9933b4c46df8eb532e6

github.com/...ow/ragflow/blob/v0.20.5/api/apps/system_app.py

github.com/...low/ragflow/blob/v0.20.5/api/utils/__init__.py

github.com/...ow/ragflow/blob/v0.20.5/api/utils/api_utils.py

cve.org (CVE-2025-69286)

nvd.nist.gov (CVE-2025-69286)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.