PT-2025-39075 · Flowise · Flowise
Published
2025-09-15
·
Updated
2026-05-11
·
CVE-2025-59528
CVSS v3.1
10
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Flowise versions prior to 3.0.6
Description
Flowise is a drag-and-drop user interface for building customized large language model flows. A critical issue exists in the CustomMCP node, which allows users to input configuration settings for connecting to an external Model Context Protocol (MCP) server. The node parses the
mcpServerConfig string to build the server configuration but executes JavaScript code without security validation. Specifically, the convertToValidJSONString() function passes user input directly to the Function() constructor, evaluating it as JavaScript code. Because this process runs with full Node.js runtime privileges, it allows access to dangerous modules such as child process and fs, enabling remote code execution, file system access, and full system compromise. The issue is accessible via the '/api/v1/node-load-method/customMCP' endpoint through the mcpServerConfig parameter. It is estimated that between 12,000 and 15,000 internet-facing instances are potentially affected, and active real-world exploitation has been observed.Recommendations
Update to version 3.0.6 or later.
As a temporary workaround, disable or restrict access to the CustomMCP node and the '/api/v1/node-load-method/customMCP' endpoint.
Restrict management and API endpoints behind a VPN or IP allowlists.
Revoke and rotate API tokens and credentials.
Exploit
Fix
LPE
RCE
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Flowise