An XSS vulnerability in infiniflow/ragflow version 0.12.0 allows an attacker to upload a malicious PDF file to the knowledge base. When the file is viewed within Ragflow, the payload is executed in the context of the user's browser. This can lead to session hijacking, data exfiltration, or unauthorized actions performed on behalf of the victim, compromising sensitive user data and affecting the integrity of the entire application.
                
            References
                    Configurations
                    History
                    01 Apr 2025, 20:34
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://huntr.com/bounties/7903945c-2839-4dd5-9d40-9ef47fe53118 - Exploit | |
| First Time | Infiniflow ragflow Infiniflow | |
| CPE | cpe:2.3:a:infiniflow:ragflow:0.12.0:*:*:*:*:*:*:* | |
| Summary | 
 | 
20 Mar 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://huntr.com/bounties/7903945c-2839-4dd5-9d40-9ef47fe53118 - | 
20 Mar 2025, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-20 10:15
Updated : 2025-04-01 20:34
NVD link : CVE-2024-12871
Mitre link : CVE-2024-12871
CVE.ORG link : CVE-2024-12871
JSON object : View
Products Affected
                infiniflow
- ragflow
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
