Skip to content
CVSS 7.5 · HIGH

CVE-2026-41279

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in the request body. When called without a chatflowId, the endpoint uses the provided credentialId to decrypt the stored credential (e.g., OpenAI or ElevenLabs API key) and generate speech. This vulnerability is fixed in 3.1.0.

View on NVD

Analysis

Flowise versions prior to 3.1.0 contain a vulnerability where the text-to-speech generation endpoint is accessible without authentication. Attackers can provide a credential ID in the request to use your stored API keys, such as OpenAI or ElevenLabs, potentially exhausting your service quotas. Users self-hosting Flowise should update to version 3.1.0 immediately.

Severity

Score: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: NONE
I: NONE
A: HIGH
Weakness (CWE): CWE-639

EPSS

Probability of exploitation (next 30 days): 0.0005 (0.1%)
Percentile: 16.5%
EPSS: 2026-05-06

Affects

flowiseai:flowise

Technical description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in the request body. When called without a chatflowId, the endpoint uses the provided credentialId to decrypt the stored credential (e.g., OpenAI or ElevenLabs API key) and generate speech. This vulnerability is fixed in 3.1.0.

Published: 4/23/2026, 8:16:16 PM
Last modified: 4/24/2026, 4:31:36 PM

References

HomeEventsBlogResourcesTeam