CVE-2024-12433
CRITICALInfiniflow Ragflow < 0.14.0 - Insecure Deserialization
Title source: ruleDescription
A vulnerability in infiniflow/ragflow versions v0.12.0 allows for remote code execution. The RPC server in RagFlow uses a hard-coded AuthKey 'authkey=b'infiniflow-token4kevinhu'' which can be easily fetched by attackers to join the group communication without restrictions. Additionally, the server processes incoming data using pickle deserialization via `pickle.loads()` on `connection.recv()`, making it vulnerable to remote code execution. This issue is fixed in version 0.14.0.
Scores
CVSS v3
9.8
EPSS
0.0214
EPSS Percentile
84.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
published
Affected Products (1)
infiniflow/ragflow
< 0.14.0
Timeline
Published
Mar 20, 2025
Tracked Since
Feb 18, 2026