Vulnerability Description
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.22.0, the use of an insecure key generation algorithm in the API key and beta (assistant/agent share auth) token generation process allows these tokens to be mutually derivable. Specifically, both tokens are generated using the same `URLSafeTimedSerializer` with predictable inputs, enabling an unauthorized user who obtains the shared assistant/agent URL to derive the personal API key. This grants them full control over the assistant/agent owner's account. Version 0.22.0 fixes the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Infiniflow | Ragflow | < 0.22.0 |
Related Weaknesses (CWE)
References
- https://github.com/infiniflow/ragflow/blob/v0.20.5/api/apps/system_app.py#L214-LProduct
- https://github.com/infiniflow/ragflow/blob/v0.20.5/api/utils/__init__.py#L343Product
- https://github.com/infiniflow/ragflow/blob/v0.20.5/api/utils/api_utils.py#L378Product
- https://github.com/infiniflow/ragflow/commit/a3bb4aadcc3494fb27f2a9933b4c46df8ebPatch
- https://github.com/infiniflow/ragflow/security/advisories/GHSA-9j5g-g4xm-57w7ExploitVendor Advisory
- https://github.com/infiniflow/ragflow/security/advisories/GHSA-9j5g-g4xm-57w7ExploitVendor Advisory
FAQ
What is CVE-2025-69286?
CVE-2025-69286 is a vulnerability with a CVSS score of 9.8 (CRITICAL). RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.22.0, the use of an insecure key generation algorithm in the API key and beta (assistant/agent share auth)...
How severe is CVE-2025-69286?
CVE-2025-69286 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-69286?
Check the references section above for vendor advisories and patch information. Affected products include: Infiniflow Ragflow.