FlowiseAI Credential Data Leak via Filtered API Request
FlowiseAI versions 3.1.1 and earlier leak encrypted credential data when API requests include a `credentialName` filter, potentially leading to full credential theft if combined with access to the encryption key.
FlowiseAI, a low-code platform for building AI applications, is vulnerable to a high-severity credential data leak. Versions 3.1.1 and earlier fail to properly sanitize API responses when fetching credentials using a credentialName filter. This oversight exposes the encryptedData field, which should be omitted to protect sensitive information. An authenticated attacker can exploit this vulnerability to extract encrypted API keys, passwords, and tokens used to access services like OpenAI and AWS. Successful exploitation, coupled with unauthorized access to the ~/.flowise/encryption.key file, allows for complete credential theft, potentially compromising integrated services and sensitive data. This vulnerability was published on May 14, 2026.
Attack Chain
- An attacker gains authenticated access to a FlowiseAI instance.
- The attacker crafts an API request to the
/api/v1/credentialsendpoint. - The request includes the
credentialNameparameter to filter the credentials being fetched, such ascredentialName=openAIApi. - The FlowiseAI server processes the request via
packages/server/src/services/credentials/index.ts. - Due to a flaw in the code at lines 62-63 and 70-71, the
encryptedDatafield is not stripped from the API response. - The server returns the API response containing the
encryptedDatafield, which includes AES-encrypted credentials. - If the attacker gains access to the
~/.flowise/encryption.keyfile (often written with default permissions), they can decrypt theencryptedData. - The attacker obtains the plaintext credentials, enabling them to compromise integrated services and data.
Impact
Successful exploitation of this vulnerability allows authenticated users to steal encrypted credential data from FlowiseAI instances. If the attacker also gains access to the encryption key, this leads to full credential theft, potentially compromising integrated services like OpenAI and AWS. The number of victims is dependent on the number of vulnerable FlowiseAI instances exposed to authenticated attackers. If successful, the attacker could gain unauthorized access to critical cloud services and sensitive data, leading to significant financial and reputational damage.
Recommendation
- Deploy the Sigma rule
Detect FlowiseAI Credential API Leakto identify requests that could be used to exploit this vulnerability by monitoring webserver logs for requests to the/api/v1/credentialsendpoint with thecredentialNameparameter present in the URL. - Upgrade FlowiseAI to a version greater than 3.1.1 to patch the vulnerability as per the information in the advisory.
- Monitor file access events for unauthorized access to the
~/.flowise/encryption.keyfile using theDetect FlowiseAI Encryption Key AccessSigma rule to prevent credential decryption after exfiltration.
Detection coverage 2
Detect FlowiseAI Credential API Leak
mediumDetects attempts to retrieve credentials via the FlowiseAI API with the credentialName filter, potentially exposing encrypted data.
Detect FlowiseAI Encryption Key Access
highDetects unauthorized access to the FlowiseAI encryption key file, which could be used to decrypt exfiltrated credentials.
Detection queries are available on the platform. Get full rules →