CVE-2026-28797
EUVD-2026-1887603.04.2026, 22:16
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components. These components use Python's jinja2.Template (unsandboxed) to render user-supplied templates, allowing any authenticated user to execute arbitrary operating system commands on the server. At time of publication, there are no publicly available patches.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| infiniflow | ragflow | 𝑥 ≤ 0.24.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration