Server-side Request Forgery (SSRF) Affecting flowise-components package, versions >=1.6.3 <3.0.6


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FLOWISECOMPONENTS-12840076
  • published18 Sept 2025
  • disclosed15 Sept 2025
  • creditim-soohyun

Introduced: 15 Sep 2025

CVE-2025-59527  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade flowise-components to version 3.0.6 or higher.

Overview

flowise-components is a Flowiseai Components

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the fetch function in the fetch-links feature when user-supplied URLs are not validated. An attacker can access internal network resources and sensitive administrative endpoints by supplying crafted URLs to the server.

CVSS Base Scores

version 4.0
version 3.1