FlowiseAI Mass Assignment in Assistant Update Endpoint Allows Cross-Workspace Resource Reassignment
FlowiseAI version 3.1.1 and earlier contains a mass assignment vulnerability in the assistant update endpoint, allowing authenticated users to modify server-controlled properties like workspaceId, createdDate, and updatedDate, enabling cross-workspace reassignment of assistants and breaking tenant isolation in multi-workspace environments.
FlowiseAI version 3.1.1 and earlier is vulnerable to a mass assignment vulnerability in its assistant update endpoint. This vulnerability allows authenticated users to modify server-controlled properties, including workspaceId, createdDate, and updatedDate. By manipulating these properties, particularly the workspaceId, an attacker can reassign assistants to arbitrary workspaces. This poses a significant risk in multi-tenant deployments where tenant isolation is critical. The vulnerability arises due to missing server-side validation and authorization checks, allowing user-controlled request bodies to override internal, server-controlled properties. This can lead to unauthorized data access and modification across different workspaces.
Attack Chain
- Attacker authenticates to the FlowiseAI interface with valid credentials.
- Attacker captures the HTTP request sent to update an assistant resource using the PUT
/api/v1/assistants/{assistantId}endpoint. - Attacker modifies the JSON request body to include the
workspaceIdparameter, setting it to the target workspace’s ID. - The attacker also injects
createdDateandupdatedDateparameters to control the assistant’s metadata. - Attacker sends the modified request to the
/api/v1/assistants/{assistantId}endpoint. - The server accepts the attacker-controlled
workspaceId,createdDate, andupdatedDatevalues without proper validation. - The assistant resource is reassigned to the attacker-specified workspace, breaking tenant isolation.
- The attacker can now access and manipulate the reassigned assistant within the target workspace, potentially gaining unauthorized access to sensitive data.
Impact
The mass assignment vulnerability in FlowiseAI allows authenticated users to perform unauthorized actions, including cross-workspace reassignment of assistants and modification of metadata. In multi-tenant deployments, this can lead to a complete breakdown of tenant isolation, allowing attackers to access and manipulate resources belonging to other tenants. The confirmed impacts include unauthorized modification of assistant metadata and cross-workspace data access. If successful, this can lead to data breaches, compliance violations, and reputational damage.
Recommendation
- Deploy the Sigma rule
Detect FlowiseAI Assistant WorkspaceId Manipulationto detect attempts to modify the workspaceId parameter in the/api/v1/assistants/{assistantId}endpoint. - Deploy the Sigma rule
Detect FlowiseAI Assistant Date Field Manipulationto detect attempts to modify the createdDate or updatedDate parameters in the/api/v1/assistants/{assistantId}endpoint. - Upgrade FlowiseAI to a version greater than 3.1.1 to remediate the mass assignment vulnerability.
Detection coverage 2
Detect FlowiseAI Assistant WorkspaceId Manipulation
highDetects attempts to manipulate the workspaceId parameter in the FlowiseAI assistant update endpoint, indicating a potential cross-workspace reassignment attempt.
Detect FlowiseAI Assistant Date Field Manipulation
mediumDetects attempts to manipulate the createdDate or updatedDate parameters in the FlowiseAI assistant update endpoint, indicating a potential metadata modification.
Detection queries are available on the platform. Get full rules →