CVE-2026-6587

⚪ Do wiadomości

Wykonanie manipulacji w funkcji RAGAS umożliwia zdalne ataki typu server-side request forgery.

CVSS
6.3
EPSS
0.0%
Exploit
none
Vendor
Opis źródłowy (NVD)

A security flaw has been discovered in vibrantlabsai RAGAS up to 0.4.3. The affected element is the function _try_process_local_file/_try_process_url of the file src/ragas/metrics/collections/multi_modal_faithfulness/util.py of the component Collections Module. Performing a manipulation of the argument retrieved_contexts results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The security patch for CVE-2025-45691 was applied to a different module only. The vendor was contacted early about this disclosure but did not respond in any way.

ssrf Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS6.3
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.0%
Opublikowano (NVD)2026-04-20 00:16:34 UTC
Ostatnia modyfikacja (NVD)2026-04-20 00:16:34 UTC
Referencje