CVE-2024-12433
CRITICALInfiniflow Ragflow < 0.14.0 - Insecure Deserialization
Title source: ruleDescription
A vulnerability in infiniflow/ragflow versions v0.12.0 allows for remote code execution. The RPC server in RagFlow uses a hard-coded AuthKey 'authkey=b'infiniflow-token4kevinhu'' which can be easily fetched by attackers to join the group communication without restrictions. Additionally, the server processes incoming data using pickle deserialization via `pickle.loads()` on `connection.recv()`, making it vulnerable to remote code execution. This issue is fixed in version 0.14.0.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/8a1465af-09e4-42af-9e54-0b70e7c87499
Scores
CVSS v3
9.8
EPSS
0.0317
EPSS Percentile
87.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-502
Status
published
Products (1)
infiniflow/ragflow
0.12.0 - 0.14.0
Published
Mar 20, 2025
Tracked Since
Feb 18, 2026