Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-45691

Опубликовано: 05 мар. 2026
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.

A flaw was found in Ragas. Improper validation of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs leads to Server-Side Request Forgery (SSRF). This vulnerability allows attackers to perform arbitrary file reads, conduct internal port scans and access cloud metadata.

Отчет

To exploit this flaw, an attacker needs to supply malicious input to a Ragas evaluation pipeline, typically by poisoning a dataset or submitting payloads directly via an API. This issue allows arbitrary file reads, internal port scans and access to cloud metadata, but it does not cause memory corruption or arbitrary command execution. Due to these reasons, this vulnerability has been rated with an important severity.

Меры по смягчению последствий

To mitigate this vulnerability, implement strict input validation to filter out malicious payloads before passing the retrieved_contexts parameter to the Ragas evaluation pipeline. Specifically, enforce an allowlist that only accepts http:// or https:// URLs, explicitly rejecting the file:// scheme. Additionally, ensure the account running the Ragas process operates with principle of least privilege, restricting access to sensitive system files.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift AI (RHOAI)rhoai/odh-llama-stack-core-rhel9Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-trustyai-ragas-lls-provider-dsp-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2444875ragas: arbitrary file read via improper URL validation in multimodal inputs

EPSS

Процентиль: 17%
0.00054
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 месяца назад

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.

CVSS3: 7.5
github
около 1 месяца назад

RAGAS has an Arbitrary File Read vulnerability

EPSS

Процентиль: 17%
0.00054
Низкий

7.5 High

CVSS3