logo

CVE-2025-8943 flowise

Package

Manager: npm
Name: flowise
Vulnerable Version: >=0 <=3.0.5

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00063 pctl0.19912

Details

Flowise OS command remote code execution The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.

Metadata

Created: 2025-08-14T12:30:23Z
Modified: 2025-08-18T21:07:48Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-2vv2-3x8x-4gv7/GHSA-2vv2-3x8x-4gv7.json
CWE IDs: ["CWE-306", "CWE-78"]
Alternative ID: GHSA-2vv2-3x8x-4gv7
Finding: F404
Auto approve: 1