Home

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, an improper mass assignment (JSON injection) vulnerability in the account registration endpoint of Flowise Cloud allows unauthenticated attackers to inject server-managed fields and nested objects during account creation. This enables client-controlled manipulation of ownership metadata, timestamps, organization association, and role mappings, breaking trust boundaries in a multi-tenant environment. This vulnerability is fixed in 3.1.0.

PUBLISHED Reserved 2026-04-18 | Published 2026-04-23 | Updated 2026-04-23 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

< 3.1.0
affected

References

github.com/...lowise/security/advisories/GHSA-48m6-ch88-55mj exploit

github.com/...lowise/security/advisories/GHSA-48m6-ch88-55mj

cve.org (CVE-2026-41267)

nvd.nist.gov (CVE-2026-41267)

Download JSON