Skip to content
CVSS 7.5 · HIGH

CVE-2026-41275

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user (e.g., public Wi-Fi) can intercept the reset link and gain unauthorized access to the victim’s account. This vulnerability is fixed in 3.1.0.

View on NVD

Analysis

Flowise versions prior to 3.1.0 transmit password reset links over insecure HTTP instead of HTTPS. If you are using Flowise to build LLM applications, update to the latest version immediately to prevent attackers on your local network from intercepting reset links and hijacking your account.

Severity

Score: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
AV: NETWORK
AC: HIGH
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-319

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 5.2%
EPSS: 2026-05-06

Affects

flowiseai:flowise

Technical description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user (e.g., public Wi-Fi) can intercept the reset link and gain unauthorized access to the victim’s account. This vulnerability is fixed in 3.1.0.

Published: 4/23/2026, 8:16:16 PM
Last modified: 4/25/2026, 2:16:02 AM

References

HomeEventsBlogResourcesTeam