<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FlowiseAI (&lt;= 3.1.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/flowiseai--3.1.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 15:00:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/flowiseai--3.1.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>FlowiseAI Mass Assignment in Assistant Update Endpoint Allows Cross-Workspace Resource Reassignment</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-mass-assignment/</link><pubDate>Thu, 14 May 2026 15:00:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-mass-assignment/</guid><description>FlowiseAI version 3.1.1 and earlier contains a mass assignment vulnerability in the assistant update endpoint, allowing authenticated users to modify server-controlled properties like workspaceId, createdDate, and updatedDate, enabling cross-workspace reassignment of assistants and breaking tenant isolation in multi-workspace environments.</description><content:encoded><![CDATA[<p>FlowiseAI version 3.1.1 and earlier is vulnerable to a mass assignment vulnerability in its assistant update endpoint. This vulnerability allows authenticated users to modify server-controlled properties, including workspaceId, createdDate, and updatedDate. By manipulating these properties, particularly the workspaceId, an attacker can reassign assistants to arbitrary workspaces. This poses a significant risk in multi-tenant deployments where tenant isolation is critical. The vulnerability arises due to missing server-side validation and authorization checks, allowing user-controlled request bodies to override internal, server-controlled properties. This can lead to unauthorized data access and modification across different workspaces.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the FlowiseAI interface with valid credentials.</li>
<li>Attacker captures the HTTP request sent to update an assistant resource using the PUT <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>Attacker modifies the JSON request body to include the <code>workspaceId</code> parameter, setting it to the target workspace&rsquo;s ID.</li>
<li>The attacker also injects <code>createdDate</code> and <code>updatedDate</code> parameters to control the assistant&rsquo;s metadata.</li>
<li>Attacker sends the modified request to the <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>The server accepts the attacker-controlled <code>workspaceId</code>, <code>createdDate</code>, and <code>updatedDate</code> values without proper validation.</li>
<li>The assistant resource is reassigned to the attacker-specified workspace, breaking tenant isolation.</li>
<li>The attacker can now access and manipulate the reassigned assistant within the target workspace, potentially gaining unauthorized access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The mass assignment vulnerability in FlowiseAI allows authenticated users to perform unauthorized actions, including cross-workspace reassignment of assistants and modification of metadata. In multi-tenant deployments, this can lead to a complete breakdown of tenant isolation, allowing attackers to access and manipulate resources belonging to other tenants. The confirmed impacts include unauthorized modification of assistant metadata and cross-workspace data access. If successful, this can lead to data breaches, compliance violations, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect FlowiseAI Assistant WorkspaceId Manipulation</code> to detect attempts to modify the workspaceId parameter in the <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>Deploy the Sigma rule <code>Detect FlowiseAI Assistant Date Field Manipulation</code> to detect attempts to modify the createdDate or updatedDate parameters in the <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>Upgrade FlowiseAI to a version greater than 3.1.1 to remediate the mass assignment vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass assignment</category><category>tenant isolation</category><category>flowiseai</category><category>web application</category></item></channel></rss>