Flowise

12 CVEs product

Monthly

CVE-2026-31829 HIGH POC PATCH GHSA This Week

Flowise versions prior to 3.0.13 allow unauthenticated users to trigger Server-Side Request Forgery (SSRF) attacks through improperly validated URLs in the HTTP Node component, enabling attackers to probe internal networks and cloud metadata endpoints from the Flowise server. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. Any organization running a publicly exposed Flowise instance is at immediate risk of internal network reconnaissance and potential credential theft from cloud environments.

SSRF AI / ML Flowise
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-30824 CRITICAL POC PATCH Act Now

Missing authentication on NVD data endpoint in Flowise before 3.0.13 allows unauthenticated access to internal vulnerability data. PoC available.

Authentication Bypass AI / ML Flowise
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-30823 HIGH POC PATCH This Week

Flowise versions up to 3.0.13 is affected by authorization bypass through user-controlled key (CVSS 8.8).

Authentication Bypass AI / ML Flowise
NVD GitHub
CVSS 3.0
8.8
EPSS
0.0%
CVE-2026-30822 HIGH POC PATCH This Week

Flowise versions up to 3.0.13 is affected by improperly controlled modification of dynamically-determined object attributes (CVSS 7.7).

Code Injection AI / ML Flowise
NVD GitHub
CVSS 3.0
7.7
EPSS
0.1%
CVE-2026-30821 CRITICAL POC PATCH Act Now

Unrestricted file upload in Flowise LLM workflow builder before 3.0.13 via /api/v1/attachments endpoint allows unauthenticated attackers to upload and execute malicious files. PoC available.

RCE AI / ML Flowise
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-30820 HIGH POC PATCH This Week

Privilege escalation in Flowise versions prior to 3.0.13 allows authenticated users to bypass API authorization by spoofing an internal request header, granting access to sensitive administrative functions including API key and credential management. Public exploit code exists for this vulnerability, and an attacker with valid tenant credentials can escalate to administrative privileges without additional authentication. No patch is currently available for affected deployments.

Authentication Bypass AI / ML Flowise
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-59528 CRITICAL POC PATCH THREAT Emergency

Flowise version 3.0.5 contains a remote code execution vulnerability in the CustomMCP node. The mcpServerConfig parameter is parsed unsafely, allowing attackers to inject arbitrary system commands through the MCP server configuration that are executed when Flowise spawns the MCP server process.

RCE Code Injection Node.js Flowise
NVD GitHub Exploit-DB
CVSS 3.1
10.0
EPSS
83.0%
CVE-2025-59527 HIGH POC PATCH This Week

Flowise is a drag & drop user interface to build a customized large language model flow. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

SSRF Flowise
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-58434 CRITICAL POC PATCH Act Now

Flowise is a drag & drop user interface to build a customized large language model flow. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Authentication Bypass Flowise
NVD GitHub
CVSS 3.1
9.8
EPSS
9.9%
CVE-2025-8943 CRITICAL POC THREAT Act Now

Flowise versions before 3.0.1 allow unauthenticated access to the Custom MCPs feature, which is designed to execute OS commands. The combination of no default authentication and the ability to spawn local processes via tools like npx enables unauthenticated remote code execution on any Flowise installation.

Authentication Bypass Flowise
NVD
CVSS 3.1
9.8
EPSS
80.4%
CVE-2025-29189 HIGH POC PATCH This Week

Flowise <= 2.2.3 is vulnerable to SQL Injection. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

SQLi Flowise
NVD
CVSS 3.1
7.6
EPSS
0.6%
CVE-2025-26319 CRITICAL POC THREAT Emergency

FlowiseAI Flowise version 2.2.6 contains an arbitrary file upload vulnerability in the /api/v1/attachments endpoint. Unauthenticated attackers can upload malicious files including executable scripts, achieving remote code execution on the Flowise server.

File Upload Flowise
NVD GitHub
CVSS 3.1
9.8
EPSS
77.0%
CVE-2026-31829
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

Flowise versions prior to 3.0.13 allow unauthenticated users to trigger Server-Side Request Forgery (SSRF) attacks through improperly validated URLs in the HTTP Node component, enabling attackers to probe internal networks and cloud metadata endpoints from the Flowise server. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. Any organization running a publicly exposed Flowise instance is at immediate risk of internal network reconnaissance and potential credential theft from cloud environments.

SSRF AI / ML Flowise
NVD GitHub VulDB
CVE-2026-30824
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Missing authentication on NVD data endpoint in Flowise before 3.0.13 allows unauthenticated access to internal vulnerability data. PoC available.

Authentication Bypass AI / ML Flowise
NVD GitHub
CVE-2026-30823
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Flowise versions up to 3.0.13 is affected by authorization bypass through user-controlled key (CVSS 8.8).

Authentication Bypass AI / ML Flowise
NVD GitHub
CVE-2026-30822
EPSS 0% CVSS 7.7
HIGH POC PATCH This Week

Flowise versions up to 3.0.13 is affected by improperly controlled modification of dynamically-determined object attributes (CVSS 7.7).

Code Injection AI / ML Flowise
NVD GitHub
CVE-2026-30821
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Unrestricted file upload in Flowise LLM workflow builder before 3.0.13 via /api/v1/attachments endpoint allows unauthenticated attackers to upload and execute malicious files. PoC available.

RCE AI / ML Flowise
NVD GitHub
CVE-2026-30820
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Privilege escalation in Flowise versions prior to 3.0.13 allows authenticated users to bypass API authorization by spoofing an internal request header, granting access to sensitive administrative functions including API key and credential management. Public exploit code exists for this vulnerability, and an attacker with valid tenant credentials can escalate to administrative privileges without additional authentication. No patch is currently available for affected deployments.

Authentication Bypass AI / ML Flowise
NVD GitHub
CVE-2025-59528
EPSS 83% CVSS 10.0
CRITICAL POC PATCH THREAT Emergency

Flowise version 3.0.5 contains a remote code execution vulnerability in the CustomMCP node. The mcpServerConfig parameter is parsed unsafely, allowing attackers to inject arbitrary system commands through the MCP server configuration that are executed when Flowise spawns the MCP server process.

RCE Code Injection Node.js +1
NVD GitHub Exploit-DB
CVE-2025-59527
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Flowise is a drag & drop user interface to build a customized large language model flow. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

SSRF Flowise
NVD GitHub
CVE-2025-58434
EPSS 10% CVSS 9.8
CRITICAL POC PATCH Act Now

Flowise is a drag & drop user interface to build a customized large language model flow. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Authentication Bypass Flowise
NVD GitHub
CVE-2025-8943
EPSS 80% CVSS 9.8
CRITICAL POC THREAT Act Now

Flowise versions before 3.0.1 allow unauthenticated access to the Custom MCPs feature, which is designed to execute OS commands. The combination of no default authentication and the ability to spawn local processes via tools like npx enables unauthenticated remote code execution on any Flowise installation.

Authentication Bypass Flowise
NVD
CVE-2025-29189
EPSS 1% CVSS 7.6
HIGH POC PATCH This Week

Flowise <= 2.2.3 is vulnerable to SQL Injection. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

SQLi Flowise
NVD
CVE-2025-26319
EPSS 77% CVSS 9.8
CRITICAL POC THREAT Emergency

FlowiseAI Flowise version 2.2.6 contains an arbitrary file upload vulnerability in the /api/v1/attachments endpoint. Unauthenticated attackers can upload malicious files including executable scripts, achieving remote code execution on the Flowise server.

File Upload Flowise
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy