RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.22.0, the use of an insecure key generation algorithm in the API key and beta (assistant/agent share auth) token generation process allows these tokens to be mutually derivable. Specifically, both tokens are generated using the same `URLSafeTimedSerializer` with predictable inputs, enabling an unauthorized user who obtains the shared assistant/agent URL to derive the personal API key. This grants them full control over the assistant/agent owner's account. Version 0.22.0 fixes the issue.
References
Configurations
History
06 Jan 2026, 16:47
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Infiniflow ragflow
Infiniflow |
|
| CPE | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/infiniflow/ragflow/blob/v0.20.5/api/apps/system_app.py#L214-L215 - Product | |
| References | () https://github.com/infiniflow/ragflow/blob/v0.20.5/api/utils/__init__.py#L343 - Product | |
| References | () https://github.com/infiniflow/ragflow/blob/v0.20.5/api/utils/api_utils.py#L378 - Product | |
| References | () https://github.com/infiniflow/ragflow/commit/a3bb4aadcc3494fb27f2a9933b4c46df8eb532e6 - Patch | |
| References | () https://github.com/infiniflow/ragflow/security/advisories/GHSA-9j5g-g4xm-57w7 - Exploit, Vendor Advisory |
02 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/infiniflow/ragflow/security/advisories/GHSA-9j5g-g4xm-57w7 - |
31 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-31 22:15
Updated : 2026-01-06 16:47
NVD link : CVE-2025-69286
Mitre link : CVE-2025-69286
CVE.ORG link : CVE-2025-69286
JSON object : View
Products Affected
infiniflow
- ragflow
CWE
CWE-340
Generation of Predictable Numbers or Identifiers
