CVE-2025-68700

8.8 HIGH

📋 TL;DR

CVE-2025-68700 is a critical remote code execution vulnerability in RAGFlow where authenticated low-privilege users can execute arbitrary system commands on the server. This occurs due to improper use of eval() on untrusted data in the Canvas CodeExec component, bypassing sandbox isolation. All RAGFlow instances running versions before 0.23.0 are affected.

💻 Affected Systems

Products:
  • RAGFlow
Versions: All versions prior to 0.23.0
Operating Systems: All platforms running RAGFlow
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but even low-privilege normal user accounts can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, lateral movement, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attacker gains full control of the RAGFlow server, accesses sensitive data, and potentially compromises other systems in the network.

🟢

If Mitigated

Limited impact with proper network segmentation and strict access controls, though RCE would still be possible for authenticated users.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly accessible to attackers who can obtain low-privilege credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain full server control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. The vulnerability is in a core component with clear attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.23.0

Vendor Advisory: https://github.com/infiniflow/ragflow/security/advisories/GHSA-8xw3-v6c2-j84j

Restart Required: Yes

Instructions:

1. Backup your RAGFlow configuration and data. 2. Stop the RAGFlow service. 3. Update to version 0.23.0 or later using your package manager or by downloading from the official repository. 4. Restart the RAGFlow service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Canvas CodeExec Component

all

Temporarily disable the vulnerable Canvas CodeExec component to prevent exploitation.

Modify RAGFlow configuration to disable the Canvas CodeExec feature. Check documentation for specific configuration parameters.

Restrict User Access

all

Limit access to only trusted administrators until patching can be completed.

Disable all normal user accounts and restrict access to admin accounts only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RAGFlow servers from critical systems
  • Enable detailed logging and monitoring for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check if your RAGFlow version is below 0.23.0. Review configuration to see if Canvas CodeExec component is enabled.

Check Version:

Check RAGFlow documentation for version command, typically via web interface or configuration files.

Verify Fix Applied:

Confirm version is 0.23.0 or higher. Test that the Canvas CodeExec component no longer accepts arbitrary command execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in RAGFlow logs
  • Multiple failed authentication attempts followed by successful login and command execution
  • Unexpected system commands originating from RAGFlow process

Network Indicators:

  • Outbound connections from RAGFlow server to suspicious external IPs
  • Unusual data exfiltration patterns

SIEM Query:

Example: 'source="ragflow" AND (event="command_execution" OR event="eval")'

🔗 References

📤 Share & Export