Insecure Key Generation in RAGFlow API Allows Token Derivation
CVE-2025-69286
8.9HIGH
What is CVE-2025-69286?
RAGFlow, an open-source Retrieval-Augmented Generation engine, presents a vulnerability due to an insecure key generation algorithm. Versions before 0.22.0 utilize the same URLSafeTimedSerializer for API key and auth token generation with predictable inputs. This flaw enables unauthorized users with access to shared URLs to derive the personal API key, granting them full control over the account of the assistant/agent owner. The issue has been resolved in version 0.22.0.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
ragflow < 0.22.0
