Home

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal state fields of DocumentStore entities. Because the service uses repository.save() with a client-supplied primary key, the POST create endpoint behaves as an implicit UPSERT operation. This enables overwriting existing DocumentStore objects. In multi-workspace or multi-tenant deployments, this can lead to cross-workspace object takeover and broken object-level authorization (IDOR), allowing an attacker to reassign or modify DocumentStore objects belonging to other workspaces. This vulnerability is fixed in 3.1.0.

PUBLISHED Reserved 2026-04-18 | Published 2026-04-23 | Updated 2026-04-25 | Assigner GitHub_M




HIGH: 7.6CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-284: Improper Access Control

CWE-639: Authorization Bypass Through User-Controlled Key

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

< 3.1.0
affected

References

github.com/...lowise/security/advisories/GHSA-3prp-9gf7-4rxx exploit

github.com/...lowise/security/advisories/GHSA-3prp-9gf7-4rxx

cve.org (CVE-2026-41277)

nvd.nist.gov (CVE-2026-41277)

Download JSON