Skip to main content

CVE-2025-48187: CWE-307 Improper Restriction of Excessive Authentication Attempts in infiniflow RAGFlow

Critical
VulnerabilityCVE-2025-48187cvecve-2025-48187cwe-307
Published: Sat May 17 2025 (05/17/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: infiniflow
Product: RAGFlow

Description

RAGFlow through 0.18.1 allows account takeover because it is possible to conduct successful brute-force attacks against email verification codes to perform arbitrary account registration, login, and password reset. Codes are six digits and there is no rate limiting.

AI-Powered Analysis

AILast updated: 07/11/2025, 17:34:46 UTC

Technical Analysis

CVE-2025-48187 is a critical vulnerability identified in the infiniflow RAGFlow product, specifically affecting versions up to 0.18.1. The vulnerability arises from improper restriction of excessive authentication attempts (CWE-307), allowing attackers to perform brute-force attacks against six-digit email verification codes used during account registration, login, and password reset processes. Because there is no rate limiting or throttling mechanism implemented, an attacker can systematically try all possible combinations of the six-digit codes (ranging from 000000 to 999999) without being blocked or delayed. This flaw enables arbitrary account takeover, allowing unauthorized access to user accounts, potentially leading to data exposure, impersonation, and unauthorized actions within the application. The vulnerability does not require any prior authentication or user interaction, and the attack can be conducted remotely over the network. The CVSS v3.1 base score of 9.1 reflects the high impact on confidentiality and integrity, with no impact on availability. The vulnerability affects the core authentication mechanism of RAGFlow, a product developed by infiniflow, which is used for managing user accounts and authentication flows. No patches or fixes have been published at the time of this report, and no known exploits are currently observed in the wild, though the ease of exploitation and critical impact make it a high-risk issue.

Potential Impact

For European organizations using infiniflow RAGFlow, this vulnerability poses a significant risk to user account security and data confidentiality. Successful exploitation can lead to unauthorized access to sensitive user data, manipulation of account settings, and potential lateral movement within organizational systems if RAGFlow is integrated with other internal services. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. The lack of rate limiting means automated attacks can be executed at scale, increasing the likelihood of compromise. Organizations relying on RAGFlow for critical authentication workflows may face operational disruptions if attackers leverage compromised accounts to escalate privileges or disrupt services. Additionally, the vulnerability could be exploited to reset passwords of legitimate users, locking them out and causing denial of service at the user level. Given the criticality and ease of exploitation, European entities must prioritize addressing this vulnerability to maintain security posture and compliance.

Mitigation Recommendations

Immediate mitigation steps include implementing rate limiting or throttling on the verification code input mechanism to restrict the number of attempts per user or IP address within a given timeframe. Organizations should monitor authentication logs for unusual patterns indicative of brute-force attempts and deploy anomaly detection systems to alert on suspicious activities. Multi-factor authentication (MFA) should be enforced to add an additional layer of security beyond email verification codes. If possible, temporarily disable or restrict the affected verification flows until a patch is available. Organizations should also educate users about potential phishing or social engineering attacks that could leverage compromised accounts. On the vendor side, infiniflow must urgently develop and release a patch that enforces proper rate limiting, increases verification code complexity or length, and incorporates account lockout mechanisms after repeated failed attempts. Until a patch is available, organizations should consider isolating RAGFlow deployments or limiting access to trusted networks. Regularly updating and auditing authentication mechanisms and integrating security testing into the development lifecycle will help prevent similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb5a4

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 5:34:46 PM

Last updated: 8/18/2025, 11:30:39 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats