flowise@1.3.2 vulnerabilities

Flowiseai Server

Direct Vulnerabilities

Known vulnerabilities in the flowise package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
SQL Injection: Hibernate

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to SQL Injection: Hibernate via the importChatflows process. An attacker can execute arbitrary SQL commands by injecting malicious SQL code into the input parameters.

How to fix SQL Injection: Hibernate?

Upgrade flowise to version 2.2.8 or higher.

<2.2.8
  • C
Arbitrary Code Injection

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary Code Injection via the /api/v1/document-store/loader/process API. An attacker can execute arbitrary code by manipulating the fileName parameter to traverse directories and overwrite critical files such as package.json, leading to remote code execution when the server is started.

Note:

The writing functions addBase64FilesToStorage, addArrayFilesToStorage and addSingleFileToStorage in packages/components/src/storageUtils.ts are vulnerable.

How to fix Arbitrary Code Injection?

Upgrade flowise to version 2.1.0 or higher.

<2.1.0
  • C
Arbitrary File Upload

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Arbitrary File Upload through the /api/v1/attachments endpoint. An attacker can upload malicious files to the server by sending specially crafted requests to this endpoint.

Note:

This is only exploitable if the server configuration allows file uploads without proper validation or sanitization.

How to fix Arbitrary File Upload?

Upgrade flowise to version 2.2.7-patch.1 or higher.

<2.2.7-patch.1
  • H
External Control of System or Configuration Setting

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to External Control of System or Configuration Setting via the overrideConfig option. An attacker can execute arbitrary code, crash the server, perform server-side request forgery and exfiltrate server variables and data by injecting malicious configurations.

How to fix External Control of System or Configuration Setting?

Upgrade flowise to version 2.1.4 or higher.

<2.1.4
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the creation of a chatflow. An attacker can bypass input filters by providing a snippet without an event handler as input to a conversation, like <iframe src=javascript:console.log(document.domain)>. This input is passed on to the administration panel and executed.

How to fix Cross-site Scripting (XSS)?

Upgrade flowise to version 2.1.1 or higher.

<2.1.1
  • H
Uncontrolled Resource Consumption

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption through the /api/v1/get-upload-file API endpoint. An attacker can cause the application to crash by sending specially crafted input.

How to fix Uncontrolled Resource Consumption?

There is no fixed version for flowise.

*
  • H
Improper Authentication

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Improper Authentication via the API endpoint authentication process. An attacker can gain unauthorized administrative access and manipulate restricted functionalities by bypassing the authentication mechanism.

How to fix Improper Authentication?

Upgrade flowise to version 2.0.6 or higher.

<2.0.6
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the /api/v1/public-chatflows/id endpoint, which returns a 404 page in the absence of a chatflow ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the /api/v1/chatflows-streaming/id, which returns a 404 page in the absence of a streaming ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the /api/v1/credentials/id endpoint, which returns a 404 page in the absence of a credential ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • M
Cross-site Scripting (XSS)

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the api/v1/chatflows/id endpoint, which returns a 404 page in the absence of a chatflow ID. An attacker can inject malicious scripts into the text/html page to read unintended files on the filesystem.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for flowise.

*
  • H
Path Traversal

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Path Traversal due to improper sanitization of the filename parameter used by the /api/v1/openai-assistants-file endpoint. An attacker can pass in a path traversal string to read arbitrary files on the vulnerable file system.

How to fix Path Traversal?

There is no fixed version for flowise.

*
  • M
Origin Validation Error

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Origin Validation Error due to the use of the Access-Control-Allow-Origin header being set to allow all origins by default. An attacker can expose information by making requests from unauthorized origins.

How to fix Origin Validation Error?

Upgrade flowise to version 1.4.12 or higher.

<1.4.12
  • C
Improper Control of Generation of Code ('Code Injection')

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') due to improper input validation in the api/v1 component. An attacker can execute arbitrary code by sending a crafted script.

How to fix Improper Control of Generation of Code ('Code Injection')?

Upgrade flowise to version 2.0.6 or higher.

<2.0.6