Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-95ww-475f-pr4f | RAGAS has SSRF via Multi-Modal Faithfulness Collections Module |
Mon, 20 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 20 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vibrantlabsai
Vibrantlabsai ragas |
|
| Vendors & Products |
Vibrantlabsai
Vibrantlabsai ragas |
Mon, 20 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in vibrantlabsai RAGAS up to 0.4.3. The affected element is the function _try_process_local_file/_try_process_url of the file src/ragas/metrics/collections/multi_modal_faithfulness/util.py of the component Collections Module. Performing a manipulation of the argument retrieved_contexts results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The security patch for CVE-2025-45691 was applied to a different module only. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | vibrantlabsai RAGAS Collections util.py _try_process_url server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-20T12:35:42.222Z
Reserved: 2026-04-19T05:47:10.948Z
Link: CVE-2026-6587
Updated: 2026-04-20T12:35:38.377Z
Status : Deferred
Published: 2026-04-20T00:16:34.703
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-6587
OpenCVE Enrichment
Updated: 2026-04-20T01:30:39Z
Github GHSA