Arbitrary Code Injection Affecting flowise-components package, versions >=1.3.0 <3.1.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.32% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FLOWISECOMPONENTS-16110988
  • published20 Apr 2026
  • disclosed16 Apr 2026
  • creditLIFE-team2024

Introduced: 16 Apr 2026

NewCVE-2026-41138  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade flowise-components to version 3.1.0 or higher.

Overview

flowise-components is a Flowiseai Components

Affected versions of this package are vulnerable to Arbitrary Code Injection through the pythonCodeValidator and the Python execution paths in AirtableAgent.ts and CSVAgent.ts. An attacker can supply LLM-generated Python code that smuggles in additional imports or reflection-based access and have it executed inside the Pyodide runtime. This lets the attacker run unauthorized Python code in memory, exposing or manipulating data handled by the agent and potentially reaching host-level functionality available to the runtime.

Workarounds

  • Disable or avoid using the Airtable Agent and CSV Agent paths that execute LLM-generated Python, so attacker-supplied prompt injection cannot reach Pyodide execution.
  • If you must keep those agents enabled, block any generated Python that contains import statements, including from ... import ..., so the model cannot add extra modules before execution.

CVSS Base Scores

version 4.0
version 3.1