Home

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in the request body. When called without a chatflowId, the endpoint uses the provided credentialId to decrypt the stored credential (e.g., OpenAI or ElevenLabs API key) and generate speech. This vulnerability is fixed in 3.1.0.

PUBLISHED Reserved 2026-04-18 | Published 2026-04-23 | Updated 2026-04-23 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 3.1.0
affected

References

github.com/...lowise/security/advisories/GHSA-5fw2-mwhh-9947

cve.org (CVE-2026-41279)

nvd.nist.gov (CVE-2026-41279)

Download JSON