Missing Authentication for Critical Function Affecting flowise package, versions <3.1.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Authentication for Critical Function vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FLOWISE-16119254
  • published22 Apr 2026
  • disclosed16 Apr 2026
  • creditUnknown

Introduced: 16 Apr 2026

NewCVE-2026-41273  (opens in a new tab)
CWE-306  (opens in a new tab)

How to fix?

Upgrade flowise to version 3.1.0 or higher.

Overview

flowise is a Flowiseai Server

Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the public-chatbotConfig and oauth2-credential/refresh endpoints. An attacker can obtain OAuth 2.0 access tokens for third-party services by retrieving internal workflow data and refreshing credentials without authentication. This is only exploitable if a self-hosted instance is configured with public chatflows that use OAuth 2.0 credentials.

References

CVSS Base Scores

version 4.0
version 3.1