PT-2025-39075 · Flowise · Flowise

Published

2025-09-15

·

Updated

2026-04-07

·

CVE-2025-59528

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Flowise versions 3.0.5
Description Flowise is a drag & drop user interface to build a customized large language model flow. Version 3.0.5 is vulnerable to remote code execution due to unsafe JavaScript code evaluation within the CustomMCP node. The node parses the user-provided mcpServerConfig string without proper security validation and executes it using the Function() constructor. This allows attackers to execute arbitrary code with full Node.js runtime privileges, potentially accessing dangerous modules like child process and fs. The vulnerability is triggered through the /api/v1/node-load-method/customMCP API endpoint, specifically via the mcpServerConfig parameter. Recent reports indicate first-time exploitation of this vulnerability, with an estimated 12,000 to 15,000 instances online potentially affected. A proof of concept demonstrates the ability to execute commands on the server by injecting malicious code into the mcpServerConfig parameter.
Recommendations Update to version 3.0.6 or later.

Exploit

Fix

RCE

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2026-03235
CVE-2025-59528
GHSA-3GCM-F6QX-FF7P

Affected Products

Flowise