{"vulnerability": "GHSA-3GQJ-66QM-25JQ", "sightings": [{"uuid": "a13550c4-e0e4-48c8-ba98-30d551d36871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-3GQJ-66QM-25JQ", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5362", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27135\n\ud83d\udd25 CVSS Score: 8.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. Versions 0.15.1 and prior are vulnerable to SQL injection. The ExeSQL component extracts the SQL statement from the input and sends it directly to the database query. As of time of publication, no patched version is available.\n\ud83d\udccf Published: 2025-02-25T18:16:58.667Z\n\ud83d\udccf Modified: 2025-02-25T18:57:33.672Z\n\ud83d\udd17 References:\n1. https://github.com/infiniflow/ragflow/security/advisories/GHSA-3gqj-66qm-25jq\n2. https://github.com/infiniflow/ragflow/blob/v0.15.1/agent/component/exesql.py\n3. https://swizzky.notion.site/ragflow-exesql-150ca6df7c03806989cefde915cf8e42?pvs=4", "creation_timestamp": "2025-02-25T19:23:55.000000Z"}]}