Home

Description

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, a Server-Side Request Forgery (SSRF) vulnerability was discovered in the /api/v1/fetch-links endpoint of the Flowise application. This vulnerability allows an attacker to use the Flowise server as a proxy to access internal network web services and explore their link structures. This issue has been patched in version 3.0.6.

PUBLISHED Reserved 2025-09-17 | Published 2025-09-22 | Updated 2025-09-22 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-918: Server-Side Request Forgery (SSRF)

Product status

= 3.0.5
affected

References

github.com/...lowise/security/advisories/GHSA-hr92-4q35-4j3m

github.com/...a1f5b9fec81d0/packages/components/src/utils.ts

github.com/...es/server/src/controllers/fetch-links/index.ts

github.com/...kages/server/src/services/fetch-links/index.ts

github.com/FlowiseAI/Flowise/releases/tag/flowise@3.0.6

cve.org (CVE-2025-59527)

nvd.nist.gov (CVE-2025-59527)

Download JSON