Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24770: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in infiniflow ragflow

0
Critical
VulnerabilityCVE-2026-24770cvecve-2026-24770cwe-22
Published: Tue Jan 27 2026 (01/27/2026, 21:51:44 UTC)
Source: CVE Database V5
Vendor/Project: infiniflow
Product: ragflow

Description

CVE-2026-24770 is a critical path traversal vulnerability in the MinerU parser component of the open-source RAG engine, RAGFlow (version 0. 23. 1 and earlier). The vulnerability, known as a 'Zip Slip', allows an attacker to craft a malicious ZIP archive that, when extracted by the vulnerable MinerUParser, can overwrite arbitrary files on the server. This can lead to remote code execution without requiring authentication or user interaction. The root cause is improper sanitization of filenames during ZIP extraction in the _extract_zip_no_root method. A patch has been committed to address this issue. Given its critical CVSS score of 9. 8, exploitation could severely impact confidentiality, integrity, and availability of affected systems. European organizations using RAGFlow should urgently apply the fix and restrict ZIP file sources to trusted origins.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:15:04 UTC

Technical Analysis

CVE-2026-24770 is a critical vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly referred to as a 'Zip Slip'. It affects the MinerU parser component of the open-source Retrieval-Augmented Generation (RAG) engine, RAGFlow, specifically versions 0.23.1 and earlier. The vulnerability arises from the MinerUParser class's method _extract_zip_no_root, which extracts ZIP files retrieved from an external source (mineru_server_url) without properly sanitizing the filenames contained within the archive. This lack of validation allows an attacker to craft a malicious ZIP archive containing path traversal sequences (e.g., ../) in filenames, enabling them to overwrite arbitrary files on the server's filesystem during extraction. Such file overwrites can lead to remote code execution (RCE) if critical system or application files are replaced or malicious scripts are planted. The vulnerability requires no authentication and no user interaction, making it highly exploitable remotely. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with ease of exploitation over the network. Although no known exploits are reported in the wild yet, the presence of a public patch (commit 64c75d558e4a17a4a48953b4c201526431d8338f) indicates active remediation efforts. Organizations using RAGFlow should prioritize updating to patched versions and review their ZIP file handling processes to prevent exploitation.

Potential Impact

For European organizations deploying RAGFlow, especially those integrating external data sources or automating document ingestion via ZIP archives, this vulnerability poses a significant risk. Exploitation could lead to complete system compromise, data breaches, and service disruption. Confidential information could be exfiltrated or altered, and critical infrastructure relying on RAGFlow for AI-driven data processing could be manipulated or disabled. Given the critical severity and remote exploitability without authentication, attackers could leverage this vulnerability to gain persistent footholds in networks. Sectors such as finance, healthcare, research institutions, and government agencies using RAGFlow or its components are particularly at risk. The impact extends beyond individual systems if attackers use compromised hosts as pivot points for lateral movement within enterprise networks. Additionally, the open-source nature of RAGFlow means that many organizations may deploy it without extensive security vetting, increasing exposure.

Mitigation Recommendations

1. Immediately update RAGFlow to the latest patched version that includes the fix from commit 64c75d558e4a17a4a48953b4c201526431d8338f or later. 2. Implement strict validation and sanitization of all filenames within ZIP archives before extraction, ensuring no path traversal sequences are allowed. 3. Restrict the mineru_server_url or any external ZIP sources to trusted and authenticated endpoints only. 4. Employ application-layer sandboxing or containerization for ZIP extraction processes to limit filesystem access and contain potential damage. 5. Monitor file system changes and audit logs for unusual overwrites or modifications, especially in directories where ZIP contents are extracted. 6. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts involving ZIP archive path traversal. 7. Educate development and DevOps teams about secure handling of archive files and incorporate security testing for ZIP extraction routines in CI/CD pipelines. 8. If immediate patching is not feasible, consider disabling or restricting the MinerU parser’s ZIP extraction functionality temporarily.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T21:06:47.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697936c84623b1157c4a64fc

Added to database: 1/27/2026, 10:06:00 PM

Last enriched: 2/4/2026, 9:15:04 AM

Last updated: 2/7/2026, 9:28:04 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats