Low-coding tool: Critical vulnerability with highest rating jeopardizes Flowise

Attackers can target several critical vulnerabilities in the Flowise low-coding platform and compromise systems.

listen Print view
Businesswoman,Pressing,Unlocking,On,Virtual,Screens,,Technology,For,Cyber,Attack,

(Image: oatawa/Shutterstock.com)

2 min. read

The developers of the low-coding platform Flowise have closed a total of seven security vulnerabilities. Five vulnerabilities are considered"critical". In the worst-case scenario, malicious code can get onto systems. A patched version provides a remedy.

At the end of this article, interested parties can find the developers' warning messages with further information on the vulnerabilities. The most dangerous is a"critical" malicious code vulnerability with the highest rating (CVSS v3 10/10), for which a CVE number has apparently not yet been assigned. Because JavaScript code is obviously not validated in the context of a connection to a model context protocol server (MCP), remote attackers can execute their own code. This usually leads to them gaining full control over computers.

By exploiting the other critical vulnerabilities, attackers can, among other things, reset passwords to gain unauthorized access (CVE-2025-58434). Attackers can also access files that are actually sealed off. A CVE number has apparently not yet been assigned for this vulnerability either.

By successfully exploiting another vulnerability (no CVE number yet, threat level "high"), attackers can break out of the sandbox due to an insecure default configuration and execute system commands. According to the developers, this leads to attackers being able to execute malicious code remotely and completely compromise systems in this way.

The developers state that they have eliminated the software vulnerabilities in Flowise version 3.0.6. It is currently not known whether there are already attacks.

Videos by heise

Several security vulnerabilities in the low-coding platform were last closed in March of this year.

List sorted by threat level in descending order:

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.