<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cross-Workspace — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cross-workspace/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 16:24:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cross-workspace/feed.xml" rel="self" type="application/rss+xml"/><item><title>FlowiseAI Cross-Workspace Assistant Takeover via Mass Assignment</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-workspace-takeover/</link><pubDate>Thu, 14 May 2026 16:24:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-workspace-takeover/</guid><description>FlowiseAI is vulnerable to a mass assignment vulnerability in the Assistant controller/service allowing an attacker, authenticated as a member of one workspace, to move an assistant (including configurations, instructions, tools and credentials) to another workspace by overwriting the `workspaceId` and `id` fields in the request body, leading to cross-workspace data takeover and IDOR.</description><content:encoded><![CDATA[<p>FlowiseAI versions 3.1.1 and earlier are vulnerable to a mass assignment vulnerability in the Assistant controller located in <code>packages/server/src/services/assistants/index.ts</code>. An authenticated user can exploit this vulnerability to move an assistant, including its configuration, instructions, attached tools, and credentials, from one workspace to another. The vulnerability stems from the use of <code>Object.assign(entity, body)</code> without proper input validation, allowing a malicious actor to overwrite the <code>workspaceId</code> and <code>id</code> attributes of the Assistant entity. This issue is similar to a previously patched vulnerability in the <code>DocumentStore</code> (commit 840d2ae), highlighting a pattern of insecure mass assignment within the application. This vulnerability can lead to cross-workspace data access and privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to FlowiseAI as a member of workspace A, obtaining a valid session cookie or JWT.</li>
<li>The attacker creates (or reuses) an existing assistant within workspace A and notes the assistant&rsquo;s <code>id</code>.</li>
<li>The attacker crafts a malicious <code>PUT</code> request to the <code>/api/v1/assistants/&lt;id&gt;</code> endpoint.</li>
<li>The <code>PUT</code> request includes a JSON body containing a <code>workspaceId</code> attribute set to the UUID of workspace B (the target workspace).</li>
<li>The FlowiseAI server receives the request and calls <code>Object.assign(updateEntity, body)</code> within the Assistant controller.</li>
<li>The <code>workspaceId</code> in the request body overwrites the existing <code>workspaceId</code> of the assistant entity.</li>
<li>The persistence layer updates the assistant record in the database, associating it with workspace B.</li>
<li>The assistant is now accessible to members of workspace B, and the attacker in workspace A loses access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows any authenticated user with permission to update an assistant to move it to another workspace, violating workspace isolation. Given that workspace UUIDs are easily enumerated via the API, an attacker can readily target specific workspaces. Successfully moving an assistant grants the destination workspace access to the assistant&rsquo;s configuration, instructions, attached tools, and credentials, potentially leading to unauthorized access to sensitive data and resources. This issue is classified as high severity because it breaks a fundamental security boundary within the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FlowiseAI to a version higher than 3.1.1 to incorporate the fix described in PR <a href="https://github.com/FlowiseAI/Flowise/pull/6128">https://github.com/FlowiseAI/Flowise/pull/6128</a>.</li>
<li>Deploy the Sigma rule <code>Detect FlowiseAI WorkspaceId Mass Assignment</code> to your SIEM to identify potential exploitation attempts.</li>
<li>Implement regression tests as described in the advisory to prevent future occurrences of this type of vulnerability; ensure requests containing <code>workspaceId</code>, <code>id</code>, <code>createdDate</code>, or <code>updatedDate</code> are rejected on both create and update paths.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass-assignment</category><category>cross-workspace</category><category>flowiseai</category></item><item><title>FlowiseAI CustomTemplate Mass Assignment Allows Cross-Workspace Template Takeover</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowise-template-takeover/</link><pubDate>Thu, 14 May 2026 16:24:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowise-template-takeover/</guid><description>FlowiseAI is vulnerable to cross-workspace data takeover due to mass assignment in the CustomTemplate controller, allowing an attacker to move templates to other workspaces by overwriting the `workspaceId` via API request.</description><content:encoded><![CDATA[<p>FlowiseAI versions 3.1.1 and earlier are vulnerable to a mass assignment vulnerability in the CustomTemplate controller (<code>packages/server/src/services/marketplaces/index.ts</code>). This flaw allows an authenticated attacker to modify the <code>workspaceId</code> of a custom template through an API request, effectively moving the template to another workspace. The vulnerability stems from the use of <code>Object.assign(entity, body)</code> without proper input validation, enabling the client to control critical fields like <code>workspaceId</code> and <code>id</code>. This issue poses a significant threat as it breaks workspace isolation and allows unauthorized access to custom templates. The vulnerability was identified and a fix has been suggested via allowlisting in PR <a href="https://github.com/FlowiseAI/Flowise/pull/6129">https://github.com/FlowiseAI/Flowise/pull/6129</a>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker, authenticated to workspace A, obtains a valid session cookie/JWT for the Flowise web UI.</li>
<li>Attacker identifies or creates a custom template within workspace A and notes its entity <code>id</code>.</li>
<li>Attacker crafts a <code>PUT /api/v1/customtemplates/&lt;id&gt;</code> request, including a JSON body with the target workspace B&rsquo;s UUID in the <code>&quot;workspaceId&quot;</code> field (e.g., <code>&quot;workspaceId&quot;: &quot;&lt;workspace-B-id&gt;&quot;</code>).</li>
<li>The server receives the request and calls <code>Object.assign(updateEntity, body)</code>, copying the attacker-supplied <code>workspaceId</code> into the entity.</li>
<li>The updated entity, now associated with workspace B, is persisted to the database.</li>
<li>The custom template is now accessible to members of workspace B and can be modified or used by them.</li>
<li>The attacker from workspace A loses access to the template, as it is no longer associated with their workspace.</li>
<li>Workspace A&rsquo;s audit logs do not reflect any unauthorized activity, as the operation appears as a normal template update.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows any authenticated user to violate workspace boundaries, potentially exposing sensitive workflow templates to unauthorized users. An attacker can move a customtemplate to any workspace whose UUID they can enumerate, which is made trivial due to workspace UUIDs being exposed in API responses. Successful exploitation allows unauthorized access, modification, and usage of custom templates, potentially leading to data leaks or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a version of FlowiseAI that includes the fix from PR <a href="https://github.com/FlowiseAI/Flowise/pull/6129">https://github.com/FlowiseAI/Flowise/pull/6129</a>, which implements an allowlist pattern.</li>
<li>Implement regression tests as described in the advisory to prevent future regressions that could reintroduce mass assignment vulnerabilities in CustomTemplate creation and update paths.</li>
<li>Deploy the Sigma rule <code>Detect Flowise CustomTemplate WorkspaceId Modification</code> to detect potential exploitation attempts by monitoring API requests to the <code>/api/v1/customtemplates/&lt;id&gt;</code> endpoint with a modified <code>workspaceId</code> in the request body.</li>
<li>Enable webserver logging to facilitate the detection of malicious HTTP requests.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass-assignment</category><category>cross-workspace</category><category>privilege-escalation</category></item><item><title>FlowiseAI Cross-Workspace Dataset Takeover via Mass Assignment</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-dataset-takeover/</link><pubDate>Thu, 14 May 2026 16:24:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-dataset-takeover/</guid><description>FlowiseAI is vulnerable to a mass assignment vulnerability via `Object.assign(entity, body)` which allows a client-controlled `workspaceId` to be overwritten on the Dataset entity, leading to cross-workspace data takeover and IDOR.</description><content:encoded><![CDATA[<p>FlowiseAI versions 3.1.1 and earlier contain a mass assignment vulnerability in the Dataset service, allowing authenticated users to move datasets between workspaces. The vulnerability stems from the use of <code>Object.assign()</code> to copy request body parameters directly into Dataset entities without proper input validation or sanitization. Specifically, the <code>workspaceId</code> field can be overwritten by a malicious user, leading to unauthorized access and data exposure in the target workspace. The root cause mirrors a previously patched vulnerability in the <code>DocumentStore</code> service, indicating a systemic issue with input handling across the application. This flaw can be exploited by any authenticated user with permission to update a dataset.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to FlowiseAI within workspace A, obtaining a valid session cookie or JWT.</li>
<li>The attacker identifies a dataset within workspace A that they have permission to update.</li>
<li>The attacker crafts a malicious API request (PUT <code>/api/v1/datasets/&lt;id&gt;</code>) to update the target dataset.</li>
<li>The request body includes a <code>workspaceId</code> parameter set to the UUID of a different workspace (workspace B).</li>
<li>The server-side Dataset controller uses <code>Object.assign(updateEntity, body)</code> to update the dataset entity, blindly accepting the malicious <code>workspaceId</code>.</li>
<li>The persistence layer commits the changes to the database, updating the <code>workspaceId</code> of the dataset.</li>
<li>The dataset is now associated with workspace B, granting access to members of workspace B.</li>
<li>The attacker in workspace A loses access to the dataset, effectively transferring ownership.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows any authenticated user to move datasets from one workspace to another, leading to unauthorized data access and potential data breaches. Datasets contain training and evaluation data, which may include sensitive information. Successful exploitation allows unauthorized access to this data in the destination workspace, and removes access from the original owner. Given that workspace UUIDs can be enumerated via the API, the impact is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch from PR <a href="https://github.com/FlowiseAI/Flowise/pull/6051">https://github.com/FlowiseAI/Flowise/pull/6051</a> which implements an allowlist pattern.</li>
<li>Implement regression tests to ensure that attempts to modify <code>workspaceId</code>, <code>id</code>, <code>createdDate</code>, or <code>updatedDate</code> fields via API requests are rejected or ignored (see suggested fix in content).</li>
<li>Deploy the Sigma rule below to detect suspicious updates to dataset entities with modified <code>workspaceId</code> values.</li>
<li>Implement input validation on all API endpoints that modify Dataset entities to prevent mass assignment vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass-assignment</category><category>cross-workspace</category><category>idor</category><category>flowiseai</category></item><item><title>FlowiseAI DatasetRow Mass Assignment Allows Cross-Workspace Data Takeover</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-datasetrow-takeover/</link><pubDate>Thu, 14 May 2026 16:24:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-datasetrow-takeover/</guid><description>FlowiseAI is vulnerable to a mass assignment vulnerability in the DatasetRow controller/service, allowing an authenticated attacker to overwrite the `workspaceId` and `id` of a DatasetRow entity, leading to cross-workspace data takeover and IDOR.</description><content:encoded><![CDATA[<p>FlowiseAI versions 3.1.1 and earlier contain a mass assignment vulnerability in the DatasetRow controller/service (<code>packages/server/src/services/dataset/index.ts</code>). The vulnerability arises from the use of <code>Object.assign(entity, body)</code> without an explicit field allowlist when creating or updating DatasetRow entities. This allows an attacker to control properties like <code>workspaceId</code> and <code>id</code> through the request body, leading to a cross-workspace data takeover. The vulnerability is similar to a previously patched issue in <code>DocumentStore</code> (commit 840d2ae), where an explicit field-by-field allowlist was implemented. This oversight enables an authenticated user to move DatasetRows, which contain individual training/evaluation records, between workspaces, potentially exposing sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker, authenticated as a member of workspace A, obtains a valid session cookie or JWT for the Flowise web UI.</li>
<li>The attacker creates a new DatasetRow within workspace A using the documented API (or reuses an existing one).</li>
<li>The attacker identifies the <code>id</code> of the DatasetRow they control.</li>
<li>The attacker sends a <code>PUT</code> request to the <code>/api/v1/datasetrows/&lt;id&gt;</code> endpoint (or an equivalent update endpoint).</li>
<li>The <code>PUT</code> request includes a JSON body containing <code>&quot;workspaceId&quot;: &quot;&lt;workspace-B-id&gt;&quot;</code>, where <code>&lt;workspace-B-id&gt;</code> is the UUID of a different, arbitrary workspace.</li>
<li>The server-side controller receives the request and executes <code>Object.assign(updateEntity, body)</code>.</li>
<li>The <code>workspaceId</code> value from the request body overwrites the original <code>workspaceId</code> field of the <code>updateEntity</code>.</li>
<li>The persistence layer commits the modified row to the database, resulting in the DatasetRow being associated with workspace B. Members of workspace B can now access, modify, and utilize the transferred DatasetRow, while workspace A loses access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows any authenticated workspace member with the permission to update a DatasetRow to move it to any workspace. Since workspace UUIDs are exposed through API responses (e.g., <code>/api/v1/workspaces</code>), enumeration is trivial. This cross-workspace boundary violation exposes training/evaluation records contained in DatasetRows to unauthorized users. An attacker can also rebind a row to a Dataset in another workspace via <code>datasetId</code>, further exposing row content.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to FlowiseAI version 3.1.2 or later, where the fix from PR <a href="https://github.com/FlowiseAI/Flowise/pull/6051">https://github.com/FlowiseAI/Flowise/pull/6051</a> has been applied, implementing an allowlist pattern.</li>
<li>Deploy the Sigma rule &ldquo;Detect FlowiseAI DatasetRow WorkspaceId Modification&rdquo; to detect attempts to modify the <code>workspaceId</code> parameter via the <code>/api/v1/datasetrows</code> endpoint.</li>
<li>Implement regression tests that assert requests containing <code>workspaceId</code>, <code>id</code>, <code>createdDate</code>, or <code>updatedDate</code> are rejected or do not change those columns on the persisted row for both create and update paths, as suggested in the overview.</li>
<li>Monitor web server logs for PUT requests to <code>/api/v1/datasetrows</code> with unusual parameters in the request body.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass-assignment</category><category>idor</category><category>cross-workspace</category></item><item><title>FlowiseAI Evaluation Cross-Workspace Data Takeover via Mass Assignment</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-evaluation-takeover/</link><pubDate>Thu, 14 May 2026 16:23:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-evaluation-takeover/</guid><description>FlowiseAI is vulnerable to a mass assignment vulnerability (fixed in PR 6050) that allows authenticated users to move Evaluation entities between workspaces by overwriting the `workspaceId` field via API request, leading to unauthorized data access.</description><content:encoded><![CDATA[<p>FlowiseAI, a low-code/no-code platform for building AI orchestration flows, is susceptible to a mass assignment vulnerability in versions 3.1.1 and earlier. The vulnerability resides within the Evaluation controller/service (<code>packages/server/src/services/evaluations/index.ts</code>). By exploiting this flaw, an authenticated user can manipulate the <code>workspaceId</code> of an Evaluation entity. This manipulation is possible due to the use of <code>Object.assign(entity, body)</code> without proper input validation, allowing an attacker to inject arbitrary <code>workspaceId</code> values into the request body. The vulnerability poses a significant risk as it enables cross-workspace data access and manipulation, potentially exposing sensitive information to unauthorized users. The root cause is similar to a previously patched vulnerability in <code>DocumentStore</code> (commit 840d2ae), indicating a pattern of insecure object assignment within the codebase.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to FlowiseAI as a member of workspace A, obtaining a valid session cookie or JWT.</li>
<li>Attacker identifies or creates an Evaluation entity within workspace A, noting its unique <code>id</code>.</li>
<li>Attacker obtains the <code>workspaceId</code> of a target workspace B, potentially through API enumeration (e.g., <code>/api/v1/workspaces</code>) or by inspecting other entities&rsquo; <code>workspaceId</code> fields.</li>
<li>Attacker crafts a <code>PUT</code> request to the <code>/api/v1/evaluations/&lt;id&gt;</code> endpoint, using the <code>id</code> of the Evaluation entity from workspace A.</li>
<li>The request body includes a JSON payload with the <code>&quot;workspaceId&quot;</code> field set to the <code>workspaceId</code> of workspace B.</li>
<li>The server&rsquo;s Evaluation controller receives the request and uses <code>Object.assign(updateEntity, body)</code> to update the Evaluation entity. The attacker-controlled <code>workspaceId</code> overwrites the existing value.</li>
<li>The persistence layer commits the changes to the database, associating the Evaluation entity with workspace B.</li>
<li>The Evaluation entity is now accessible to members of workspace B and inaccessible to members of workspace A, resulting in unauthorized data access and potential modification.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows any authenticated user to move Evaluation entities between workspaces. This cross-workspace boundary violation allows an attacker to access and potentially modify evaluation runs, including captured prompts, model outputs, and scoring data, belonging to other workspaces. Successful exploitation leads to a high level of data exposure, as the attacker can exfiltrate or manipulate data that should be isolated to specific workspaces. The vulnerability affects FlowiseAI versions up to and including 3.1.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FlowiseAI to the latest version, which includes the fix from PR <a href="https://github.com/FlowiseAI/Flowise/pull/6050">https://github.com/FlowiseAI/Flowise/pull/6050</a> that implements an allowlist pattern for updating Evaluation entities.</li>
<li>Deploy the Sigma rule <code>Detect FlowiseAI Evaluation WorkspaceId Manipulation</code> to identify potential exploitation attempts by monitoring PUT requests to the <code>/api/v1/evaluations/&lt;id&gt;</code> endpoint with modified <code>workspaceId</code> values.</li>
<li>Implement regression tests, as suggested in the source, to ensure that future code changes do not reintroduce the mass assignment vulnerability.</li>
<li>Consider implementing additional input validation on API endpoints to prevent similar mass assignment vulnerabilities in other parts of the application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass-assignment</category><category>cross-workspace</category><category>privilege-escalation</category></item><item><title>FlowiseAI Chatflow Update Endpoint Mass Assignment Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-chatflow-mass-assignment/</link><pubDate>Thu, 14 May 2026 14:55:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-chatflow-mass-assignment/</guid><description>A mass assignment vulnerability exists in FlowiseAI's chatflow update endpoint (CVE-2026-42863), allowing authenticated users to modify server-controlled properties like `deployed`, `isPublic`, and `workspaceId` due to missing server-side validation, leading to cross-workspace resource reassignment and unauthorized modification of deployment and visibility settings.</description><content:encoded><![CDATA[<p>A mass assignment vulnerability has been identified in FlowiseAI versions 3.1.1 and earlier. The vulnerability resides in the chatflow update endpoint, which lacks proper server-side validation and authorization checks. This allows authenticated users to manipulate server-controlled properties of chatflow objects, such as <code>deployed</code>, <code>isPublic</code>, and <code>workspaceId</code>, by including them in the request body. By exploiting this flaw, an attacker can reassign chatflows to different workspaces, modify deployment settings, and alter visibility settings, potentially leading to unauthorized access and control over resources in multi-tenant environments. This vulnerability is identified as CVE-2026-42863.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the FlowiseAI interface with valid credentials.</li>
<li>The attacker captures a legitimate request used to update a chatflow object via the <code>PUT /api/v1/chatflows/{chatflowId}</code> endpoint.</li>
<li>The attacker modifies the captured request body to include server-controlled fields such as <code>deployed</code>, <code>isPublic</code>, and <code>workspaceId</code>.</li>
<li>The attacker sets the <code>workspaceId</code> to the ID of a workspace controlled by the attacker.</li>
<li>The attacker sends the crafted request to the <code>/api/v1/chatflows/{chatflowId}</code> endpoint.</li>
<li>The FlowiseAI server accepts the modified request and updates the chatflow object in the database without proper validation.</li>
<li>The chatflow is now reassigned to the attacker&rsquo;s workspace, granting the attacker unauthorized access.</li>
<li>The attacker can further modify the chatflow, change its visibility, or alter its deployment status.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The mass assignment vulnerability in FlowiseAI allows authenticated users to manipulate server-controlled attributes of chatflows. This can result in unauthorized modification of chatflow visibility, deployment state changes, and cross-workspace reassignment of chatflows. In multi-tenant environments, this vulnerability breaks tenant isolation boundaries, enabling attackers to move chatflows between workspaces without authorization. Successful exploitation can lead to cross-workspace workflow takeover, unauthorized exposure of private workflows, and manipulation of deployed agent workflows, potentially affecting all FlowiseAI installations with versions 3.1.1 or lower.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect FlowiseAI Chatflow Mass Assignment Attempt via API&rdquo; to detect attempts to modify restricted fields via the chatflow update API endpoint.</li>
<li>Apply input validation to the <code>PUT /api/v1/chatflows/{chatflowId}</code> endpoint to prevent modification of <code>deployed</code>, <code>isPublic</code>, <code>workspaceId</code>, <code>createdDate</code>, <code>updatedDate</code>, <code>category</code>, and <code>type</code> parameters, mitigating CVE-2026-42863.</li>
<li>Upgrade FlowiseAI to a patched version that addresses the mass assignment vulnerability to prevent unauthorized modification of chatflow attributes, protecting against CVE-2026-42863.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass-assignment</category><category>privilege-escalation</category><category>cross-workspace</category><category>flowiseai</category></item></channel></rss>