Skip to content
CVSS 8.8 · HIGH

CVE-2026-41137

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide a command injection payload that will get interpolated and executed by the server. This vulnerability is fixed in 3.1.0.

View on NVD

Analysis

Flowise versions before 3.1.0 are vulnerable to remote code execution via the CSVAgent component. Attackers can provide malicious payloads through the custom Pandas CSV read functionality that are executed by the server, potentially leading to a full system compromise. If you are using Flowise to build LLM flows, upgrade to 3.1.0 immediately.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-94

EPSS

Probability of exploitation (next 30 days): 0.0030 (0.3%)
Percentile: 53.5%
EPSS: 2026-05-06

Affects

flowiseai:flowise

Technical description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide a command injection payload that will get interpolated and executed by the server. This vulnerability is fixed in 3.1.0.

Published: 4/23/2026, 8:16:14 PM
Last modified: 4/24/2026, 3:15:47 PM

References

HomeEventsBlogResourcesTeam