Authorization Bypass Through User-Controlled Key Affecting flowise package, versions >=3.0.8 <3.1.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FLOWISE-16115551
  • published21 Apr 2026
  • disclosed17 Apr 2026
  • creditDeathsPirate

Introduced: 17 Apr 2026

NewCVE-2026-41279  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade flowise to version 3.1.0 or higher.

Overview

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key through the generateTextToSpeech handler in text-to-speech/index.ts. An attacker can retrieve text-to-speech settings from a chatflow in another workspace by sending a TTS request with a valid chatflowId. This exposes the chatflow’s TTS configuration, including provider details and credential references, to a requester who should not be able to read it.

CVSS Base Scores

version 4.0
version 3.1