CVE-2026-24770

9.8 CRITICAL

📋 TL;DR

CVE-2026-24770 is a critical Zip Slip vulnerability in RAGFlow's MinerU parser that allows attackers to overwrite arbitrary files on the server via malicious ZIP archives, potentially leading to remote code execution. This affects RAGFlow version 0.23.1 and earlier. Organizations using vulnerable RAGFlow deployments for document processing are at risk.

💻 Affected Systems

Products:
  • RAGFlow
Versions: 0.23.1 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when MinerU parser is enabled and processes ZIP files from external sources via mineru_server_url.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, allowing attacker to execute arbitrary commands, steal data, install persistent backdoors, or pivot to other systems.

🟠

Likely Case

File system manipulation leading to service disruption, data corruption, or privilege escalation by overwriting critical configuration files.

🟢

If Mitigated

Limited impact if proper file system permissions and sandboxing prevent writes to sensitive locations, though service disruption remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Zip Slip vulnerabilities are well-understood with public exploit patterns. The vulnerability requires attacker to control ZIP file input to the MinerU parser.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 64c75d558e4a17a4a48953b4c201526431d8338f

Vendor Advisory: https://github.com/infiniflow/ragflow/security/advisories/GHSA-v7cf-w7gj-pgf4

Restart Required: Yes

Instructions:

1. Update RAGFlow to version containing commit 64c75d558e4a17a4a48953b4c201526431d8338f or later. 2. Restart all RAGFlow services. 3. Verify the _extract_zip_no_root function properly validates file paths.

🔧 Temporary Workarounds

Disable MinerU Parser

all

Temporarily disable the vulnerable MinerU parser component if not required for operations.

Modify RAGFlow configuration to disable mineru_server_url or MinerU parser functionality

Restrict ZIP File Sources

all

Limit ZIP file processing to trusted sources only.

Configure firewall rules to restrict mineru_server_url to trusted IPs only

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent writes outside designated directories
  • Deploy RAGFlow in containerized environments with read-only root filesystems

🔍 How to Verify

Check if Vulnerable:

Check RAGFlow version and verify if commit 64c75d558e4a17a4a48953b4c201526431d8338f is present in the codebase.

Check Version:

Check RAGFlow version via application logs or configuration files specific to your deployment.

Verify Fix Applied:

Verify the _extract_zip_no_root function contains proper path sanitization and validation logic.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations outside expected directories
  • ZIP extraction errors or anomalies in MinerU parser logs
  • Unexpected file modifications in system directories

Network Indicators:

  • Unusual connections to mineru_server_url from untrusted sources
  • Large or suspicious ZIP file uploads to RAGFlow

SIEM Query:

source="ragflow" AND ("zip extraction" OR "mineru" OR "file write") AND (path_traversal OR "../" OR "..\")

🔗 References

📤 Share & Export