Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-41268

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined with a NODE_OPTIONS environment variable injection. This allows for the execution of arbitrary system commands with root privileges within the containerized Flowise instance, requiring only a single HTTP request and no authentication or knowledge of the instance. This vulnerability is fixed in 3.1.0.

Ver en NVD

Análisis

Flowise, a popular tool for building LLM workflows, is vulnerable to an unauthenticated remote command execution (RCE) flaw. Attackers can execute arbitrary commands with root privileges within the Flowise container using a single HTTP request. If you are running Flowise, update to version 3.1.0 immediately.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-20

EPSS

Probabilidad de explotación (próx. 30 días): 0.0068 (0.7%)
Percentil: 71.7%
EPSS: 2026-05-06

Afecta

flowiseai:flowise

Descripción técnica

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined with a NODE_OPTIONS environment variable injection. This allows for the execution of arbitrary system commands with root privileges within the containerized Flowise instance, requiring only a single HTTP request and no authentication or knowledge of the instance. This vulnerability is fixed in 3.1.0.

Publicada: 23/4/2026, 20:16:15
Última modificación: 24/4/2026, 15:14:39

Referencias

InicioEventosBlogRecursosEquipo