PT-2025-33147 · Flowise · Flowise
Assaf Levkovich
·
Published
2025-08-14
·
Updated
2026-04-07
·
CVE-2025-8943
CVSS v2.0
10
Critical
| AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions: Flowise versions prior to 3.0.1
Description: Flowise, a software platform for building user interfaces over language models (LLM), has a missing authentication check for a critical function. This allows remote, unauthenticated attackers to execute arbitrary operating system commands through the Custom MCPs feature, which is designed to execute OS commands using tools like
npx. The inherent authentication and authorization model of Flowise is minimal and lacks role-based access controls (RBAC). Active exploitation of this issue has been detected. The Custom MCPs feature executes OS commands, and the lack of authentication allows attackers to execute unsandboxed OS commands.Recommendations: Update Flowise to version 3.0.1 or later.
Exploit
Fix
RCE
OS Command Injection
Missing Authorization
Missing Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Flowise