Insecure Key Generation in RAGFlow API Allows Token Derivation
CVE-2025-69286

8.9HIGH

Key Information:

Vendor

Infiniflow

Status
Vendor
CVE Published:
31 December 2025

What is CVE-2025-69286?

RAGFlow, an open-source Retrieval-Augmented Generation engine, presents a vulnerability due to an insecure key generation algorithm. Versions before 0.22.0 utilize the same URLSafeTimedSerializer for API key and auth token generation with predictable inputs. This flaw enables unauthorized users with access to shared URLs to derive the personal API key, granting them full control over the account of the assistant/agent owner. The issue has been resolved in version 0.22.0.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

ragflow < 0.22.0

References

CVSS V4

Score:
8.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.