flowise@1.3.2 vulnerabilities

Flowiseai Server

Direct Vulnerabilities

Known vulnerabilities in the flowise package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Directory Traversal

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Directory Traversal via the WriteFile and ReadFile tools. An attacker can gain full control over the server, including executing arbitrary commands, by supplying crafted file paths that allow writing files to any location on the file system.

How to fix Directory Traversal?

Upgrade flowise to version 3.0.8 or higher.

<3.0.8
  • H
Arbitrary File Upload

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary File Upload via the file upload process. An attacker can store malicious files on the server by uploading files without proper validation of file type, extension, or content. This can result in the persistent presence of executable scripts, which may be triggered later to execute arbitrary commands on the server.

How to fix Arbitrary File Upload?

Upgrade flowise to version 3.0.8 or higher.

<3.0.8
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via insufficient input filtering of input by web applications such as chat box and agent workflow processes. An attacker can execute arbitrary JavaScript code in the victim's browser by injecting malicious scripts, potentially leading to theft of sensitive information such as cookies when a user interacts with crafted content.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the workflow UI View Messages feature in the admin panel. An attacker can execute arbitrary JavaScript in the context of an administrator's browser by injecting a specially crafted payload through message input, leading to credential theft and exposure of sensitive information stored in localStorage.

How to fix Cross-site Scripting (XSS)?

Upgrade flowise to version 2.2.7-patch.1 or higher.

<2.2.7-patch.1
  • H
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the chat logs, due to improper input sanitization. An attacker can access sensitive information or impersonate an administrator by injecting malicious HTML or scripts into chat prompts, which are then rendered when an admin views the logs.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • C
Missing Authentication for Critical Function

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the forgot-password endpoint, which returns a valid password reset tempToken and sensitive user details without authentication or verification. An attacker can gain access to arbitrary user accounts, including privileged accounts, resulting in complete account takeover.

How to fix Missing Authentication for Critical Function?

Upgrade flowise to version 3.0.6 or higher.

<3.0.6
  • M
SQL Injection: Hibernate

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to SQL Injection: Hibernate via the importChatflows process. An attacker can execute arbitrary SQL commands by injecting malicious SQL code into the input parameters.

How to fix SQL Injection: Hibernate?

Upgrade flowise to version 2.2.8 or higher.

<2.2.8
  • C
Arbitrary Code Injection

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary Code Injection via the /api/v1/document-store/loader/process API. An attacker can execute arbitrary code by manipulating the fileName parameter to traverse directories and overwrite critical files such as package.json, leading to remote code execution when the server is started.

Note:

The writing functions addBase64FilesToStorage, addArrayFilesToStorage and addSingleFileToStorage in packages/components/src/storageUtils.ts are vulnerable.

How to fix Arbitrary Code Injection?

Upgrade flowise to version 2.1.0 or higher.

<2.1.0
  • C
Arbitrary File Upload

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary File Upload through the /api/v1/attachments endpoint. An attacker can upload malicious files to the server by sending specially crafted requests to this endpoint.

Note:

This is only exploitable if the server configuration allows file uploads without proper validation or sanitization.

How to fix Arbitrary File Upload?

Upgrade flowise to version 2.2.7-patch.1 or higher.

<2.2.7-patch.1
  • H
External Control of System or Configuration Setting

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the overrideConfig option. An attacker can execute arbitrary code, crash the server, perform server-side request forgery and exfiltrate server variables and data by injecting malicious configurations.

How to fix External Control of System or Configuration Setting?

Upgrade flowise to version 2.1.4 or higher.

<2.1.4
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the creation of a chatflow. An attacker can bypass input filters by providing a snippet without an event handler as input to a conversation, like <iframe src=javascript:console.log(document.domain)>. This input is passed on to the administration panel and executed.

How to fix Cross-site Scripting (XSS)?

Upgrade flowise to version 2.1.1 or higher.

<2.1.1
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') through the /api/v1/get-upload-file API endpoint. An attacker can cause the application to crash by sending specially crafted input.

How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')?

There is no fixed version for flowise.

*
  • H
Improper Authentication

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Improper Authentication via the API endpoint authentication process. An attacker can gain unauthorized administrative access and manipulate restricted functionalities by bypassing the authentication mechanism.

How to fix Improper Authentication?

Upgrade flowise to version 2.0.6 or higher.

<2.0.6
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the /api/v1/public-chatflows/id endpoint, which returns a 404 page in the absence of a chatflow ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the /api/v1/chatflows-streaming/id, which returns a 404 page in the absence of a streaming ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the /api/v1/credentials/id endpoint, which returns a 404 page in the absence of a credential ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the api/v1/chatflows/id endpoint, which returns a 404 page in the absence of a chatflow ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • H
Path Traversal

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Path Traversal due to improper sanitization of the filename parameter used by the /api/v1/openai-assistants-file endpoint. An attacker can pass in a path traversal string to read arbitrary files on the vulnerable file system.

How to fix Path Traversal?

There is no fixed version for flowise.

*
  • M
Origin Validation Error

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Origin Validation Error due to the use of the Access-Control-Allow-Origin header being set to allow all origins by default. An attacker can expose information by making requests from unauthorized origins.

How to fix Origin Validation Error?

Upgrade flowise to version 1.4.12 or higher.

<1.4.12
  • C
Improper Control of Generation of Code ('Code Injection')

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper input validation in the api/v1 component. An attacker can execute arbitrary code by sending a crafted script.

How to fix Improper Control of Generation of Code ('Code Injection')?

Upgrade flowise to version 2.0.6 or higher.

<2.0.6