Server-side Request Forgery (SSRF) Affecting flowise-ui package, versions <3.0.13


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-FLOWISEUI-15518330
  • published13 Mar 2026
  • disclosed11 Mar 2026
  • creditnlgbao1340

Introduced: 11 Mar 2026

NewCVE-2026-31829  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade flowise-ui to version 3.0.13 or higher.

Overview

flowise-ui is a

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the HTTP Node as it is used in AgentFlow and Chatflow. An attacker can access internal network resources, retrieve sensitive information, or modify and delete data by supplying crafted URLs to the server, which then performs HTTP requests to internal or restricted endpoints on behalf of the attacker. This can lead to exposure of internal admin panels, cloud metadata, and allow further privilege escalation or lateral movement.

CVSS Base Scores

version 4.0
version 3.1