PT-2025-39075 · Flowise · Flowise

Published

2025-09-15

·

Updated

2026-04-17

·

CVE-2025-59528

CVSS v3.1

10

Critical

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Flowise versions prior to 3.0.6
Description A remote code execution issue exists in the CustomMCP node of Flowise, which allows users to input configuration settings for connecting to an external Model Context Protocol (MCP) server. The software parses the mcpServerConfig string to build the configuration but executes JavaScript code without security validation. Specifically, within the convertToValidJSONString() function, user input is passed directly to the Function() constructor, which evaluates and executes the input as JavaScript code. Because this process runs with full Node.js runtime privileges, it can access dangerous modules such as child process and fs. This flaw can be exploited via the API endpoint '/api/v1/node-load-method/customMCP' using the mcpServerConfig parameter. Between 12,000 and 15,000 internet-facing instances are estimated to be exposed, and active exploitation has been observed in the wild, including activity originating from a Starlink IP.
Recommendations Update Flowise to version 3.0.6 or later. As a temporary workaround, disable or restrict access to the CustomMCP node and the '/api/v1/node-load-method/customMCP' endpoint.

Exploit

Fix

RCE

LPE

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2026-03235
CVE-2025-59528
GHSA-3GCM-F6QX-FF7P

Affected Products

Flowise