Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-45691: n/a

0
Unknown
VulnerabilityCVE-2025-45691cvecve-2025-45691
Published: Thu Mar 05 2026 (03/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.

AI-Powered Analysis

AILast updated: 03/05/2026, 18:38:45 UTC

Technical Analysis

CVE-2025-45691 identifies an Arbitrary File Read vulnerability in the ImageTextPromptValue class of Exploding Gradients RAGAS software versions 0.2.3 to 0.2.14. The vulnerability originates from inadequate validation and sanitization of URLs passed via the retrieved_contexts parameter, which is used to handle multimodal inputs combining image and text data. This flaw allows an attacker to craft malicious URLs that, when processed by the vulnerable class, can cause the application to read arbitrary files from the underlying file system. Such unauthorized file reads can lead to exposure of sensitive configuration files, credentials, or other critical data. The vulnerability does not require authentication, increasing its risk profile, and may be exploited remotely if the application processes user-supplied multimodal inputs without proper filtering. No CVSS score has been assigned yet, and no patches or known exploits are currently documented. The lack of proper input sanitization suggests a design oversight in handling external resource references within the multimodal input processing pipeline. This vulnerability highlights the risks inherent in complex AI systems that integrate multiple data modalities without robust security controls.

Potential Impact

The primary impact of CVE-2025-45691 is unauthorized disclosure of sensitive information through arbitrary file reads. Attackers exploiting this vulnerability can access configuration files, credentials, or proprietary data stored on the affected system, potentially leading to further compromise or data breaches. For organizations relying on Exploding Gradients RAGAS in AI-driven applications, this could undermine confidentiality and trust in their systems. The vulnerability does not directly affect system integrity or availability but can serve as a stepping stone for more advanced attacks. Because it requires no authentication, any exposed interface processing multimodal inputs is at risk, increasing the attack surface. The absence of known exploits currently limits immediate widespread impact, but the vulnerability’s presence in AI frameworks used globally means that organizations in sectors such as technology, research, finance, and government could face significant risks if exploited. The potential exposure of sensitive AI model data or training inputs could also have intellectual property implications.

Mitigation Recommendations

To mitigate CVE-2025-45691, organizations should implement strict validation and sanitization of all URL inputs supplied to the retrieved_contexts parameter in Exploding Gradients RAGAS. This includes enforcing allowlists for URL schemes and domains, rejecting or sanitizing any suspicious or unexpected URL formats. Deploy runtime monitoring to detect anomalous file access patterns indicative of exploitation attempts. Where possible, run the application with least privilege to limit file system access rights, preventing unauthorized reads beyond necessary directories. Until an official patch is released, consider isolating or disabling multimodal input features that accept external URLs. Conduct thorough code reviews and security testing focused on input handling in multimodal processing components. Additionally, maintain up-to-date inventories of affected software versions and prepare for rapid patch deployment once fixes become available. Educate developers and operators about the risks of improper input validation in AI frameworks to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9c994460e1c85df139319

Added to database: 3/5/2026, 6:21:08 PM

Last enriched: 3/5/2026, 6:38:45 PM

Last updated: 3/6/2026, 12:15:17 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses