Cyber Posture

CVE-2025-27135

CriticalPublic PoC

Published: 25 February 2025

Published
25 February 2025
Modified
22 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0042 61.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.

Security Summary

CVE-2025-27135 is a SQL injection vulnerability (CWE-89) in RAGFlow, an open-source Retrieval-Augmented Generation (RAG) engine. Versions 0.15.1 and prior are affected, specifically the ExeSQL component, which extracts SQL statements directly from input and executes them on the database without sanitization. The vulnerability was published on 2025-02-25 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.

An unauthenticated remote attacker with network access can exploit this vulnerability through low-complexity attacks requiring no user interaction. Exploitation allows arbitrary SQL query execution, enabling high-impact compromise of confidentiality, integrity, and availability, such as data exfiltration, modification, or deletion from the underlying database.

As of publication, no patched version of RAGFlow is available. Relevant advisories and details are documented in the GitHub security advisory (GHSA-3gqj-66qm-25jq), the affected ExeSQL source code, and external analyses on provided Notion pages.

RAGFlow's role as a RAG engine introduces AI/ML relevance, as deployments in LLM pipelines could expose sensitive data stores to remote compromise. No real-world exploitation has been reported in the available information.

Details

CWE(s)
CWE-89

Affected Products

infiniflow
ragflow
≤ 0.15.1

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

SQL injection in public-facing RAGFlow ExeSQL allows remote unauthenticated arbitrary SQL execution, directly enabling T1190 (Exploit Public-Facing Application) for initial access and facilitating T1213.006 (Databases) for data collection, T1565.001 (Stored Data Manipulation) for integrity impacts, and T1485 (Data Destruction) for availability impacts via the database.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References