Home

Description

The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.

PUBLISHED Reserved 2025-08-13 | Published 2025-08-14 | Updated 2025-08-18 | Assigner JFROG




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Any version before 3.0.1
affected

References

research.jfrog.com/...te-code-execution-jfsa-2025-001380578/ third-party-advisory

cve.org (CVE-2025-8943)

nvd.nist.gov (CVE-2025-8943)

Download JSON