Use of a Broken or Risky Cryptographic Algorithm Affecting flowise package, versions <3.1.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FLOWISE-16109645
  • published19 Apr 2026
  • disclosed16 Apr 2026
  • creditkolega-ai-dev

Introduced: 16 Apr 2026

New CVE NOT AVAILABLE CWE-327  (opens in a new tab)

How to fix?

Upgrade flowise to version 3.1.0 or higher.

Overview

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm in the process that handles JWT secret assignment. An attacker can gain unauthorized access and impersonate any user, including administrators, by crafting valid JWTs using publicly known default secrets. This is only exploitable if the environment variables for JWT secrets are not explicitly set and the application is deployed with default values.

CVSS Base Scores

version 4.0
version 3.1