Home » Database

AVID-2026-R1365

Description

Remote Code Execution in infiniflow/ragflow (CVE-2024-10131)

Details

The add_llm function in llm_app.py in infiniflow/ragflow version 0.11.0 contains a remote code execution (RCE) vulnerability. The function uses user-supplied input req['llm_factory'] and req['llm_name'] to dynamically instantiate classes from various model dictionaries. This approach allows an attacker to potentially execute arbitrary code due to the lack of comprehensive input validation or sanitization. An attacker could provide a malicious value for ‘llm_factory’ that, when used as an index to these model dictionaries, results in the execution of arbitrary code.

Reason for inclusion in AVID: CVE-2024-10131 describes a remote code execution vulnerability in the ai workflow component infiniflow/ragflow, where user-controlled input selects model dictionaries and can lead to arbitrary code execution. This directly concerns an AI framework/pipeline component used in building and running general-purpose AI systems, representing a software supply-chain issue (dependency/framework in AI stacks). It is clearly an RCE security vulnerability with CVSS details and references, providing sufficient evidence.

References

Affected or Relevant Artifacts

  • Developer: infiniflow
  • Deployer: infiniflow
  • Artifact Details:
TypeName
Systeminfiniflow/ragflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-94CWE-94 Improper Control of Generation of Code

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-10-19
  • Version: 0.3.3
  • AVID Entry