<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Crud — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/crud/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 16:24:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/crud/feed.xml" rel="self" type="application/rss+xml"/><item><title>FlowiseAI OpenAI Assistants Vector Store Missing Authentication</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-vector-store-no-auth/</link><pubDate>Thu, 14 May 2026 16:24:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-vector-store-no-auth/</guid><description>FlowiseAI versions 3.1.1 and earlier are vulnerable to a privilege escalation due to missing authentication and permission checks on the OpenAI Assistants Vector Store CRUD endpoints, allowing any authenticated user to create, modify, upload files to, and delete vector stores and files, regardless of their assigned permissions.</description><content:encoded><![CDATA[<p>FlowiseAI versions up to and including 3.1.1 are vulnerable to a critical privilege escalation issue affecting the OpenAI Assistants Vector Store. The vulnerability stems from a lack of authentication middleware and permission checks on the Create, Read, Update, and Delete (CRUD) endpoints for the vector store. Specifically, the <code>/api/v1/openai-assistants-vector-store</code> route, while requiring API key authentication, does not enforce any permission checks on operations. This oversight allows any authenticated user, regardless of their assigned role or permissions, to perform unrestricted actions on the vector store, including creating new stores, uploading files, deleting stores and files, and modifying existing stores.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the FlowiseAI instance using a valid API key.</li>
<li>The attacker sends a POST request to <code>/api/v1/openai-assistants-vector-store</code> to create a new vector store.</li>
<li>The application, lacking permission checks, creates the new vector store without validating the user&rsquo;s privileges.</li>
<li>The attacker sends a POST request to <code>/api/v1/openai-assistants-vector-store/{id}</code> to upload malicious files to the created vector store, exploiting the missing checks on file upload.</li>
<li>The attacker sends a PUT request to <code>/api/v1/openai-assistants-vector-store/{id}</code> to modify the vector store&rsquo;s configuration or data.</li>
<li>Alternatively, the attacker sends a DELETE request to <code>/api/v1/openai-assistants-vector-store/{id}</code> to delete vector stores and associated files.</li>
<li>The application executes the requested operation without proper authorization validation, leading to data manipulation or deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows any authenticated user to manipulate OpenAI vector stores within FlowiseAI. This can lead to the upload of malicious files, unauthorized deletion of sensitive data, exfiltration of stored documents, or modification of vector store configurations. This privilege escalation could allow an attacker to compromise the integrity and confidentiality of data stored within FlowiseAI.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect unauthorized creation of vector stores via the <code>/api/v1/openai-assistants-vector-store</code> endpoint.</li>
<li>Deploy the Sigma rule provided below to detect unauthorized deletion of vector stores and files via the <code>/api/v1/openai-assistants-vector-store/{id}</code> endpoint.</li>
<li>Upgrade FlowiseAI to a patched version greater than 3.1.1 to remediate the missing authentication and permission checks.</li>
<li>Implement robust access control mechanisms and permission validation on all API endpoints to prevent unauthorized data manipulation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>privilege-escalation</category><category>missing-authentication</category><category>crud</category></item></channel></rss>