Skip to content

Commit c0e0f97

Browse files
1 parent e6ec74f commit c0e0f97

1 file changed

Lines changed: 31 additions & 6 deletions

File tree

advisories/unreviewed/2026/04/GHSA-95ww-475f-pr4f/GHSA-95ww-475f-pr4f.json renamed to advisories/github-reviewed/2026/04/GHSA-95ww-475f-pr4f/GHSA-95ww-475f-pr4f.json

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-95ww-475f-pr4f",
4-
"modified": "2026-04-20T00:30:13Z",
4+
"modified": "2026-04-22T22:02:02Z",
55
"published": "2026-04-20T00:30:13Z",
66
"aliases": [
77
"CVE-2026-6587"
88
],
9+
"summary": "RAGAS has SSRF via Multi-Modal Faithfulness Collections Module",
910
"details": "A security flaw has been discovered in vibrantlabsai RAGAS up to 0.4.3. The affected element is the function _try_process_local_file/_try_process_url of the file src/ragas/metrics/collections/multi_modal_faithfulness/util.py of the component Collections Module. Performing a manipulation of the argument retrieved_contexts results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The security patch for CVE-2025-45691 was applied to a different module only. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "ragas"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0.2.3"
33+
},
34+
{
35+
"last_affected": "0.4.3"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -27,6 +48,10 @@
2748
"type": "WEB",
2849
"url": "https://adithyanak.com/ragas-v0214-arbitrary-file-read-vulnerability"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/vibrantlabsai/ragas"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://vuldb.com/submit/791088"
@@ -44,9 +69,9 @@
4469
"cwe_ids": [
4570
"CWE-918"
4671
],
47-
"severity": "MODERATE",
48-
"github_reviewed": false,
49-
"github_reviewed_at": null,
72+
"severity": "LOW",
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2026-04-22T22:02:02Z",
5075
"nvd_published_at": "2026-04-20T00:16:34Z"
5176
}
5277
}

0 commit comments

Comments
 (0)