Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24770: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in infiniflow ragflow

0
Critical
VulnerabilityCVE-2026-24770cvecve-2026-24770cwe-22
Published: Tue Jan 27 2026 (01/27/2026, 21:51:44 UTC)
Source: CVE Database V5
Vendor/Project: infiniflow
Product: ragflow

Description

CVE-2026-24770 is a critical path traversal vulnerability in the MinerU parser component of the open-source RAGFlow engine (version 0. 23. 1 and earlier). It allows attackers to craft malicious ZIP archives that exploit improper filename sanitization during extraction, enabling arbitrary file overwrite on the server. This can lead to remote code execution without requiring authentication or user interaction. The vulnerability is caused by the MinerUParser class's _extract_zip_no_root method failing to restrict extracted file paths, a classic 'Zip Slip' flaw. A patch has been committed to address this issue. The CVSS score is 9. 8, indicating a critical severity with high impact on confidentiality, integrity, and availability. European organizations using RAGFlow in production or research environments are at risk, especially those integrating external ZIP data sources.

AI-Powered Analysis

AILast updated: 01/27/2026, 22:20:17 UTC

Technical Analysis

CVE-2026-24770 identifies a critical path traversal vulnerability (CWE-22) in the MinerU parser component of the open-source Retrieval-Augmented Generation (RAG) engine named RAGFlow, specifically in version 0.23.1 and potentially earlier versions. The vulnerability arises from the MinerUParser class's method _extract_zip_no_root, which is responsible for extracting ZIP archives obtained from an external source (mineru_server_url). This method fails to properly sanitize or validate the filenames contained within the ZIP archive, allowing specially crafted ZIP files to include path traversal sequences (e.g., '../') that escape the intended extraction directory. This flaw is commonly referred to as a 'Zip Slip' vulnerability. Exploiting this vulnerability, an attacker can overwrite arbitrary files on the server's filesystem, potentially including critical system or application files. This arbitrary file overwrite capability can be leveraged to execute remote code on the server, compromising confidentiality, integrity, and availability of the affected system. The vulnerability does not require any authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. The vendor has committed a patch (commit 64c75d558e4a17a4a48953b4c201526431d8338f) that addresses the issue by properly sanitizing ZIP archive filenames before extraction. There are no known exploits in the wild at the time of publication, but the severity and ease of exploitation make it a high priority for remediation. Organizations using RAGFlow, especially in environments where ZIP files are ingested from untrusted or external sources, are at significant risk.

Potential Impact

For European organizations, the impact of CVE-2026-24770 is substantial. RAGFlow is an open-source engine used in AI and data processing workflows, and its compromise could lead to unauthorized access, data breaches, and disruption of critical AI services. The ability to overwrite arbitrary files and execute remote code can result in full system compromise, data loss, and potential lateral movement within networks. Organizations relying on RAGFlow for research, development, or production AI pipelines could face operational downtime and reputational damage. Given the criticality, attackers could leverage this vulnerability to implant persistent backdoors or exfiltrate sensitive data. The lack of authentication and user interaction requirements increases the risk of automated exploitation campaigns. Additionally, the vulnerability could be used as a foothold for further attacks targeting European infrastructure or intellectual property. The impact extends beyond confidentiality to integrity and availability, potentially disrupting AI-driven decision-making processes and services.

Mitigation Recommendations

To mitigate CVE-2026-24770, European organizations should immediately upgrade RAGFlow to a version that includes the patch from commit 64c75d558e4a17a4a48953b4c201526431d8338f or later. If upgrading is not immediately possible, implement strict input validation on ZIP files before processing, ensuring filenames do not contain path traversal sequences or absolute paths. Employ sandboxing or containerization to isolate the extraction process, limiting filesystem access rights to only necessary directories with least privilege principles. Monitor logs for unusual file extraction activities or unexpected file modifications. Network-level controls should restrict access to the mineru_server_url source to trusted entities only. Additionally, implement file integrity monitoring on critical system and application files to detect unauthorized changes. Conduct regular security audits of AI pipeline components and educate developers about secure handling of archive files. Finally, maintain up-to-date backups to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T21:06:47.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697936c84623b1157c4a64fc

Added to database: 1/27/2026, 10:06:00 PM

Last enriched: 1/27/2026, 10:20:17 PM

Last updated: 1/28/2026, 12:58:21 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats