Home

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined with a NODE_OPTIONS environment variable injection. This allows for the execution of arbitrary system commands with root privileges within the containerized Flowise instance, requiring only a single HTTP request and no authentication or knowledge of the instance. This vulnerability is fixed in 3.1.0.

PUBLISHED Reserved 2026-04-18 | Published 2026-04-23 | Updated 2026-04-23 | Assigner GitHub_M




HIGH: 7.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L

Problem types

CWE-20: Improper Input Validation

Product status

< 3.1.0
affected

References

github.com/...lowise/security/advisories/GHSA-cvrr-qhgw-2mm6 exploit

github.com/...lowise/security/advisories/GHSA-cvrr-qhgw-2mm6

cve.org (CVE-2026-41268)

nvd.nist.gov (CVE-2026-41268)

Download JSON