PT-2026-33656 · Vibrantlabsai · Ragas
Eric-Y
·
Published
2026-04-20
·
Updated
2026-04-20
·
CVE-2026-6587
CVSS v3.1
6.3
Medium
| AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
A security flaw has been discovered in vibrantlabsai RAGAS up to 0.4.3. The affected element is the function try process local file/ try process url of the file src/ragas/metrics/collections/multi modal faithfulness/util.py of the component Collections Module. Performing a manipulation of the argument retrieved contexts results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The security patch for CVE-2025-45691 was applied to a different module only. The vendor was contacted early about this disclosure but did not respond in any way.
Exploit
Fix
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Ragas