Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 06 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:infiniflow:ragflow:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Infiniflow
Infiniflow ragflow |
|
| Vendors & Products |
Infiniflow
Infiniflow ragflow |
Fri, 02 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 31 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.22.0, the use of an insecure key generation algorithm in the API key and beta (assistant/agent share auth) token generation process allows these tokens to be mutually derivable. Specifically, both tokens are generated using the same `URLSafeTimedSerializer` with predictable inputs, enabling an unauthorized user who obtains the shared assistant/agent URL to derive the personal API key. This grants them full control over the assistant/agent owner's account. Version 0.22.0 fixes the issue. | |
| Title | RAGFlow has Predictable Token Generation Leading to Authentication Bypass Vulnerability | |
| Weaknesses | CWE-340 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-02T14:35:31.041Z
Reserved: 2025-12-31T16:36:25.943Z
Link: CVE-2025-69286
Updated: 2026-01-02T14:17:05.934Z
Status : Analyzed
Published: 2025-12-31T22:15:49.280
Modified: 2026-01-06T16:47:58.753
Link: CVE-2025-69286
No data.
OpenCVE Enrichment
Updated: 2026-01-05T10:15:01Z