Insecure Key Generation in RAGFlow API Allows Token Derivation
CVE-2025-69286
8.9HIGH
What is CVE-2025-69286?
RAGFlow, an open-source Retrieval-Augmented Generation engine, presents a vulnerability due to an insecure key generation algorithm. Versions before 0.22.0 utilize the same URLSafeTimedSerializer for API key and auth token generation with predictable inputs. This flaw enables unauthorized users with access to shared URLs to derive the personal API key, granting them full control over the account of the assistant/agent owner. The issue has been resolved in version 0.22.0.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
ragflow < 0.22.0
References
CVSS V4
Score:
8.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
