From 6fc4f511bdbee40e5ed8674c22d33f37fc8ffc29 Mon Sep 17 00:00:00 2001 From: Adithyan AK Date: Tue, 7 Apr 2026 11:55:56 -0700 Subject: [PATCH] Improve GHSA-v2xr-wvrv-p969 --- .../2026/03/GHSA-v2xr-wvrv-p969/GHSA-v2xr-wvrv-p969.json | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/advisories/github-reviewed/2026/03/GHSA-v2xr-wvrv-p969/GHSA-v2xr-wvrv-p969.json b/advisories/github-reviewed/2026/03/GHSA-v2xr-wvrv-p969/GHSA-v2xr-wvrv-p969.json index d77e2f55fa1a5..e73bcb6772008 100644 --- a/advisories/github-reviewed/2026/03/GHSA-v2xr-wvrv-p969/GHSA-v2xr-wvrv-p969.json +++ b/advisories/github-reviewed/2026/03/GHSA-v2xr-wvrv-p969/GHSA-v2xr-wvrv-p969.json @@ -1,21 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-v2xr-wvrv-p969", - "modified": "2026-03-06T22:23:31Z", + "modified": "2026-03-06T22:23:33Z", "published": "2026-03-05T21:30:46Z", "aliases": [ "CVE-2025-45691" ], "summary": "RAGAS has an Arbitrary File Read vulnerability", - "details": "An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.", + "details": "An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.\n\nIdentified by Researcher: [Adithyan Arun Kumar](https://github.com/adithyan-ak)", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" - }, - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" } ], "affected": [