Skip to content
CVSS 7.1 · HIGH

CVE-2026-41269

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type. This lets an attacker upload .js files even though the frontend doesn’t normally allow JavaScript uploads. This enables attackers to persistently store malicious Node.js web shells on the server, potentially leading to Remote Code Execution (RCE). This vulnerability is fixed in 3.1.0.

View on NVD

Analysis

Flowise versions prior to 3.1.0 are vulnerable to a file upload bypass that allows attackers to store and execute malicious Node.js code. If you are using Flowise to build LLM workflows, upgrade to version 3.1.0 immediately to prevent potential remote code execution on your server.

Severity

Score: 7.1(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: LOW
I: HIGH
A: NONE
Weakness (CWE): CWE-434

EPSS

Probability of exploitation (next 30 days): 0.0008 (0.1%)
Percentile: 23.5%
EPSS: 2026-05-06

Affects

flowiseai:flowise

Technical description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type. This lets an attacker upload .js files even though the frontend doesn’t normally allow JavaScript uploads. This enables attackers to persistently store malicious Node.js web shells on the server, potentially leading to Remote Code Execution (RCE). This vulnerability is fixed in 3.1.0.

Published: 4/23/2026, 8:16:15 PM
Last modified: 4/24/2026, 7:17:11 PM

References

HomeEventsBlogResourcesTeam