3.1.0
2 years ago
1 days ago
Known vulnerabilities in the flowise package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key through the How to fix Authorization Bypass Through User-Controlled Key? Upgrade | <3.0.13 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Access Control Bypass in the How to fix Access Control Bypass? Upgrade | <3.0.13 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Arbitrary File Upload via the How to fix Arbitrary File Upload? Upgrade | <3.0.13 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes via the How to fix Improperly Controlled Modification of Dynamically-Determined Object Attributes? Upgrade | <3.0.13 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the How to fix Missing Authentication for Critical Function? Upgrade | <3.0.13 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data in the How to fix Insertion of Sensitive Information Into Sent Data? Upgrade | <3.0.13 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort due to the use of insufficient bcrypt salt rounds in the How to fix Use of Password Hash With Insufficient Computational Effort? Upgrade | <3.0.13 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Insufficient Session Expiration due to the failure to invalidate active session tokens after a password change. An attacker can maintain unauthorized access by continuing to use a previously established How to fix Insufficient Session Expiration? Upgrade | <3.0.10 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Unverified Password Change via the profile update process. An attacker can gain unauthorized access to user accounts by changing the email address associated with an account without additional verification steps. Note: This is only exploitable if the attacker gains initial access to the account. How to fix Unverified Password Change? Upgrade | <3.0.10 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Unverified Password Change via the profile update process. An attacker can gain unauthorized access to user accounts by changing the authentication password without additional verification steps. Note: This is only exploitable if the attacker gains initial access to the account. How to fix Unverified Password Change? Upgrade | <3.0.10 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Arbitrary Command Injection via the Note: When using versions vulnerable to CVE-2025-26319, an attacker can bypass the need for authentication. How to fix Arbitrary Command Injection? Upgrade | <3.0.8 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <3.0.8 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Arbitrary File Upload via the file upload process. An attacker can store malicious files on the server by uploading files without proper validation of file type, extension, or content. This can result in the persistent presence of executable scripts, which may be triggered later to execute arbitrary commands on the server. How to fix Arbitrary File Upload? Upgrade | <3.0.8 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via insufficient input filtering of input by web applications such as How to fix Cross-site Scripting (XSS)? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the workflow UI How to fix Cross-site Scripting (XSS)? Upgrade | <2.2.7-patch.1 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the chat logs, due to improper input sanitization. An attacker can access sensitive information or impersonate an administrator by injecting malicious HTML or scripts into chat prompts, which are then rendered when an admin views the logs. How to fix Cross-site Scripting (XSS)? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the How to fix Missing Authentication for Critical Function? Upgrade | <3.0.6 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to SQL Injection: Hibernate via the How to fix SQL Injection: Hibernate? Upgrade | <2.2.8 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Arbitrary Code Injection via the Note: The writing functions How to fix Arbitrary Code Injection? Upgrade | <2.1.0 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Arbitrary File Upload through the Note: This is only exploitable if the server configuration allows file uploads without proper validation or sanitization. How to fix Arbitrary File Upload? Upgrade | <2.2.7-patch.1 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the How to fix External Control of System or Configuration Setting? Upgrade | <2.1.4 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the creation of a chatflow. An attacker can bypass input filters by providing a snippet without an event handler as input to a conversation, like How to fix Cross-site Scripting (XSS)? Upgrade | <2.1.1 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') through the How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Improper Authentication via the API endpoint authentication process. An attacker can gain unauthorized administrative access and manipulate restricted functionalities by bypassing the authentication mechanism. How to fix Improper Authentication? Upgrade | <2.0.6 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Path Traversal due to improper sanitization of the How to fix Path Traversal? There is no fixed version for | * |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Origin Validation Error due to the use of the How to fix Origin Validation Error? Upgrade | <1.4.12 |
flowise is a Flowiseai Server Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper input validation in the How to fix Improper Control of Generation of Code ('Code Injection')? Upgrade | <2.0.6 |