← Voltar para CVEs
CVE-2026-28797
N/ADescricao
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components. These components use Python's jinja2.Template (unsandboxed) to render user-supplied templates, allowing any authenticated user to execute arbitrary operating system commands on the server. At time of publication, there are no publicly available patches.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado4/3/2026
Ultima modificacao4/3/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-20CWE-78CWE-94CWE-1336
Referencias
https://github.com/infiniflow/ragflow/security/advisories/GHSA-vvwj-fvwh-4whx(security-advisories@github.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.