CVE-2025-68700
Arbitrary Code Execution in RAGFlow Canvas CodeExec Component
Publication date: 2025-12-31
Last updated on: 2025-12-31
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ragflow | rag | 0.23.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in RAGFlow versions prior to 0.23.0 allows a low-privileged authenticated user to execute arbitrary system commands on the server via the frontend Canvas CodeExec component. This happens because untrusted data (stdout) is parsed using eval() without filtering or sandboxing, leading to execution of attacker-controlled code. Additional endpoints also lack proper access control or have inverted permission logic, increasing the attack surface and enabling chained exploitation. The issue is fixed in version 0.23.0.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with a normal login account to execute arbitrary system commands on the server hosting RAGFlow. This can lead to full compromise of the server, unauthorized access to sensitive data, disruption of services, and further chained attacks due to expanded attack surface from improper access controls.
What immediate steps should I take to mitigate this vulnerability?
Upgrade RAGFlow to version 0.23.0 or later, as this version contains a patch that fixes the vulnerability. Additionally, restrict access to the frontend Canvas CodeExec component and review access controls on all endpoints to prevent unauthorized command execution.