flowise@1.3.2 vulnerabilities

Flowiseai Server

Direct Vulnerabilities

Known vulnerabilities in the flowise package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Authorization Bypass Through User-Controlled Key

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key through the LoginMethodController implementation. An attacker can overwrite another organization’s SSO/OAuth configuration and potentially take over enterprise logins by sending an authenticated crafted request that specifies a target organizationId.

How to fix Authorization Bypass Through User-Controlled Key?

Upgrade flowise to version 3.0.13 or higher.

<3.0.13
  • H
Access Control Bypass

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Access Control Bypass in the middleware that processes requests to /api/v1 endpoints. An attacker can gain unauthorized access to internal administration APIs by spoofing the x-request-from header as 'internal' while possessing a valid session cookie. This allows privilege escalation, including actions such as creating API keys, accessing credential stores, and executing custom functions.

How to fix Access Control Bypass?

Upgrade flowise to version 3.0.13 or higher.

<3.0.13
  • C
Arbitrary File Upload

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary File Upload via the /api/v1/attachments/:chatflowId/:chatId endpoint, which allows unauthenticated file uploads by trusting the client-supplied MIME type without verifying the actual file content or extension. An attacker can upload arbitrary files, including executable scripts or web shells, by spoofing the Content-Type header, potentially leading to remote code execution or client-side attacks such as stored script execution when files are accessed.

How to fix Arbitrary File Upload?

Upgrade flowise to version 3.0.13 or higher.

<3.0.13
  • C
Improperly Controlled Modification of Dynamically-Determined Object Attributes

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes via the Object.assign function. An attacker can manipulate internal entity fields such as id, createdDate, and chatId by including them in the request body to the /api/v1/leads endpoint, thereby bypassing server-side auto-generation and validation. This allows unauthorized users to control sensitive attributes, potentially leading to data integrity violations, audit trail manipulation, and business logic bypasses by sending crafted requests to the public API endpoint.

How to fix Improperly Controlled Modification of Dynamically-Determined Object Attributes?

Upgrade flowise to version 3.0.13 or higher.

<3.0.13
  • H
Missing Authentication for Critical Function

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the WHITELIST_URLS configuration, which allows unauthenticated access to privileged endpoints under /api/v1/nvidia-nim/*. An attacker can obtain valid NVIDIA API tokens, manipulate container runtimes, and access sensitive information by sending unauthenticated requests to these endpoints.

How to fix Missing Authentication for Critical Function?

Upgrade flowise to version 3.0.13 or higher.

<3.0.13
  • H
Insertion of Sensitive Information Into Sent Data

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data in the /api/v1/account/forgot-password entripoint. An attacker can obtain sensitive user information, including identifiers, names, email addresses, account status, and timestamps, by sending an unauthenticated password reset request.

How to fix Insertion of Sensitive Information Into Sent Data?

Upgrade flowise to version 3.0.13 or higher.

<3.0.13
  • M
Use of Password Hash With Insufficient Computational Effort

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Use of Password Hash With Insufficient Computational Effort due to the use of insufficient bcrypt salt rounds in the getHash() function. An attacker can significantly reduce the time required to crack password hashes by performing brute-force attacks if they gain access to the hashed passwords.

How to fix Use of Password Hash With Insufficient Computational Effort?

Upgrade flowise to version 3.0.13 or higher.

<3.0.13
  • H
Insufficient Session Expiration

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Insufficient Session Expiration due to the failure to invalidate active session tokens after a password change. An attacker can maintain unauthorized access by continuing to use a previously established session even after the legitimate user updates their credentials.

How to fix Insufficient Session Expiration?

Upgrade flowise to version 3.0.10 or higher.

<3.0.10
  • H
Unverified Password Change

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Unverified Password Change via the profile update process. An attacker can gain unauthorized access to user accounts by changing the email address associated with an account without additional verification steps.

Note: This is only exploitable if the attacker gains initial access to the account.

How to fix Unverified Password Change?

Upgrade flowise to version 3.0.10 or higher.

<3.0.10
  • H
Unverified Password Change

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Unverified Password Change via the profile update process. An attacker can gain unauthorized access to user accounts by changing the authentication password without additional verification steps.

Note: This is only exploitable if the attacker gains initial access to the account.

How to fix Unverified Password Change?

Upgrade flowise to version 3.0.10 or higher.

<3.0.10
  • H
Arbitrary Command Injection

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary Command Injection via the nodevm execution environment when integrated modules such as Puppeteer or Playwright are used with attacker-controlled browser binary paths and parameters. An authenticated attacker can execute arbitrary code on the host system by creating or running a tool that leverages these modules and specifying malicious executable paths or parameters, thereby bypassing intended sandbox restrictions.

Note: When using versions vulnerable to CVE-2025-26319, an attacker can bypass the need for authentication.

How to fix Arbitrary Command Injection?

Upgrade flowise to version 3.0.8 or higher.

<3.0.8
  • M
Directory Traversal

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Directory Traversal via the WriteFile and ReadFile tools. An attacker can gain full control over the server, including executing arbitrary commands, by supplying crafted file paths that allow writing files to any location on the file system.

How to fix Directory Traversal?

Upgrade flowise to version 3.0.8 or higher.

<3.0.8
  • H
Arbitrary File Upload

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary File Upload via the file upload process. An attacker can store malicious files on the server by uploading files without proper validation of file type, extension, or content. This can result in the persistent presence of executable scripts, which may be triggered later to execute arbitrary commands on the server.

How to fix Arbitrary File Upload?

Upgrade flowise to version 3.0.8 or higher.

<3.0.8
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via insufficient input filtering of input by web applications such as chat box and agent workflow processes. An attacker can execute arbitrary JavaScript code in the victim's browser by injecting malicious scripts, potentially leading to theft of sensitive information such as cookies when a user interacts with crafted content.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the workflow UI View Messages feature in the admin panel. An attacker can execute arbitrary JavaScript in the context of an administrator's browser by injecting a specially crafted payload through message input, leading to credential theft and exposure of sensitive information stored in localStorage.

How to fix Cross-site Scripting (XSS)?

Upgrade flowise to version 2.2.7-patch.1 or higher.

<2.2.7-patch.1
  • H
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the chat logs, due to improper input sanitization. An attacker can access sensitive information or impersonate an administrator by injecting malicious HTML or scripts into chat prompts, which are then rendered when an admin views the logs.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • C
Missing Authentication for Critical Function

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the forgot-password endpoint, which returns a valid password reset tempToken and sensitive user details without authentication or verification. An attacker can gain access to arbitrary user accounts, including privileged accounts, resulting in complete account takeover.

How to fix Missing Authentication for Critical Function?

Upgrade flowise to version 3.0.6 or higher.

<3.0.6
  • M
SQL Injection: Hibernate

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to SQL Injection: Hibernate via the importChatflows process. An attacker can execute arbitrary SQL commands by injecting malicious SQL code into the input parameters.

How to fix SQL Injection: Hibernate?

Upgrade flowise to version 2.2.8 or higher.

<2.2.8
  • C
Arbitrary Code Injection

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary Code Injection via the /api/v1/document-store/loader/process API. An attacker can execute arbitrary code by manipulating the fileName parameter to traverse directories and overwrite critical files such as package.json, leading to remote code execution when the server is started.

Note:

The writing functions addBase64FilesToStorage, addArrayFilesToStorage and addSingleFileToStorage in packages/components/src/storageUtils.ts are vulnerable.

How to fix Arbitrary Code Injection?

Upgrade flowise to version 2.1.0 or higher.

<2.1.0
  • C
Arbitrary File Upload

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary File Upload through the /api/v1/attachments endpoint. An attacker can upload malicious files to the server by sending specially crafted requests to this endpoint.

Note:

This is only exploitable if the server configuration allows file uploads without proper validation or sanitization.

How to fix Arbitrary File Upload?

Upgrade flowise to version 2.2.7-patch.1 or higher.

<2.2.7-patch.1
  • H
External Control of System or Configuration Setting

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the overrideConfig option. An attacker can execute arbitrary code, crash the server, perform server-side request forgery and exfiltrate server variables and data by injecting malicious configurations.

How to fix External Control of System or Configuration Setting?

Upgrade flowise to version 2.1.4 or higher.

<2.1.4
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the creation of a chatflow. An attacker can bypass input filters by providing a snippet without an event handler as input to a conversation, like <iframe src=javascript:console.log(document.domain)>. This input is passed on to the administration panel and executed.

How to fix Cross-site Scripting (XSS)?

Upgrade flowise to version 2.1.1 or higher.

<2.1.1
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') through the /api/v1/get-upload-file API endpoint. An attacker can cause the application to crash by sending specially crafted input.

How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')?

There is no fixed version for flowise.

*
  • H
Improper Authentication

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Improper Authentication via the API endpoint authentication process. An attacker can gain unauthorized administrative access and manipulate restricted functionalities by bypassing the authentication mechanism.

How to fix Improper Authentication?

Upgrade flowise to version 2.0.6 or higher.

<2.0.6
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the /api/v1/public-chatflows/id endpoint, which returns a 404 page in the absence of a chatflow ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the /api/v1/chatflows-streaming/id, which returns a 404 page in the absence of a streaming ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the /api/v1/credentials/id endpoint, which returns a 404 page in the absence of a credential ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the api/v1/chatflows/id endpoint, which returns a 404 page in the absence of a chatflow ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • H
Path Traversal

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Path Traversal due to improper sanitization of the filename parameter used by the /api/v1/openai-assistants-file endpoint. An attacker can pass in a path traversal string to read arbitrary files on the vulnerable file system.

How to fix Path Traversal?

There is no fixed version for flowise.

*
  • M
Origin Validation Error

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Origin Validation Error due to the use of the Access-Control-Allow-Origin header being set to allow all origins by default. An attacker can expose information by making requests from unauthorized origins.

How to fix Origin Validation Error?

Upgrade flowise to version 1.4.12 or higher.

<1.4.12
  • C
Improper Control of Generation of Code ('Code Injection')

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper input validation in the api/v1 component. An attacker can execute arbitrary code by sending a crafted script.

How to fix Improper Control of Generation of Code ('Code Injection')?

Upgrade flowise to version 2.0.6 or higher.

<2.0.6