CVE-2025-68700
Unknown Unknown - Not Provided
Arbitrary Code Execution in RAGFlow Canvas CodeExec Component

Publication date: 2025-12-31

Last updated on: 2025-12-31

Assigner: GitHub, Inc.

Description
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.23.0, a low-privileged authenticated user (normal login account) can execute arbitrary system commands on the server host process via the frontend Canvas CodeExec component, completely bypassing sandbox isolation. This occurs because untrusted data (stdout) is parsed using eval() with no filtering or sandboxing. The intended design was to "automatically convert string results into Python objects," but this effectively executes attacker-controlled code. Additional endpoints lack access control or contain inverted permission logic, significantly expanding the attack surface and enabling chained exploitation. Version 0.23.0 contains a patch for the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-31
Last Modified
2025-12-31
Generated
2026-05-07
AI Q&A
2026-01-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ragflow rag 0.23.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in RAGFlow versions prior to 0.23.0 allows a low-privileged authenticated user to execute arbitrary system commands on the server via the frontend Canvas CodeExec component. This happens because untrusted data (stdout) is parsed using eval() without filtering or sandboxing, leading to execution of attacker-controlled code. Additional endpoints also lack proper access control or have inverted permission logic, increasing the attack surface and enabling chained exploitation. The issue is fixed in version 0.23.0.


How can this vulnerability impact me? :

The vulnerability can allow an attacker with a normal login account to execute arbitrary system commands on the server hosting RAGFlow. This can lead to full compromise of the server, unauthorized access to sensitive data, disruption of services, and further chained attacks due to expanded attack surface from improper access controls.


What immediate steps should I take to mitigate this vulnerability?

Upgrade RAGFlow to version 0.23.0 or later, as this version contains a patch that fixes the vulnerability. Additionally, restrict access to the frontend Canvas CodeExec component and review access controls on all endpoints to prevent unauthorized command execution.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart