CVE-2026-6587
⚪ Do wiadomości
Wykonanie manipulacji w funkcji RAGAS umożliwia zdalne ataki typu server-side request forgery.
CVSS
6.3
EPSS
0.0%
Exploit
none
Vendor
Opis źródłowy (NVD)
A security flaw has been discovered in vibrantlabsai RAGAS up to 0.4.3. The affected element is the function _try_process_local_file/_try_process_url of the file src/ragas/metrics/collections/multi_modal_faithfulness/util.py of the component Collections Module. Performing a manipulation of the argument retrieved_contexts results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The security patch for CVE-2025-45691 was applied to a different module only. The vendor was contacted early about this disclosure but did not respond in any way.
ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-20 00:16:34 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-20 00:16:34 UTC |
Referencje
- https://adithyanak.com/ragas-v0214-arbitrary-file-read-vulnerability (cna@vuldb.com)
- https://vuldb.com/submit/791088 (cna@vuldb.com)
- https://vuldb.com/vuln/358222 (cna@vuldb.com)
- https://vuldb.com/vuln/358222/cti (cna@vuldb.com)