CVE-2026-6587

A security flaw has been discovered in vibrantlabsai RAGAS up to 0.4.3. The affected element is the function _try_process_local_file/_try_process_url of the file src/ragas/metrics/collections/multi_modal_faithfulness/util.py of the component Collections Module. Performing a manipulation of the argument retrieved_contexts results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The security patch for CVE-2025-45691 was applied to a different module only. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

No configuration.

History

20 Apr 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-20 00:16

Updated : 2026-04-29 01:00


NVD link : CVE-2026-6587

Mitre link : CVE-2026-6587

CVE.ORG link : CVE-2026-6587


JSON object : View

Products Affected

No product.

CWE
CWE-918

Server-Side Request Forgery (SSRF)