<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tenant Isolation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tenant-isolation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 15:00:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tenant-isolation/feed.xml" rel="self" type="application/rss+xml"/><item><title>FlowiseAI Mass Assignment in Assistant Update Endpoint Allows Cross-Workspace Resource Reassignment</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowiseai-mass-assignment/</link><pubDate>Thu, 14 May 2026 15:00:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowiseai-mass-assignment/</guid><description>FlowiseAI version 3.1.1 and earlier contains a mass assignment vulnerability in the assistant update endpoint, allowing authenticated users to modify server-controlled properties like workspaceId, createdDate, and updatedDate, enabling cross-workspace reassignment of assistants and breaking tenant isolation in multi-workspace environments.</description><content:encoded><![CDATA[<p>FlowiseAI version 3.1.1 and earlier is vulnerable to a mass assignment vulnerability in its assistant update endpoint. This vulnerability allows authenticated users to modify server-controlled properties, including workspaceId, createdDate, and updatedDate. By manipulating these properties, particularly the workspaceId, an attacker can reassign assistants to arbitrary workspaces. This poses a significant risk in multi-tenant deployments where tenant isolation is critical. The vulnerability arises due to missing server-side validation and authorization checks, allowing user-controlled request bodies to override internal, server-controlled properties. This can lead to unauthorized data access and modification across different workspaces.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the FlowiseAI interface with valid credentials.</li>
<li>Attacker captures the HTTP request sent to update an assistant resource using the PUT <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>Attacker modifies the JSON request body to include the <code>workspaceId</code> parameter, setting it to the target workspace&rsquo;s ID.</li>
<li>The attacker also injects <code>createdDate</code> and <code>updatedDate</code> parameters to control the assistant&rsquo;s metadata.</li>
<li>Attacker sends the modified request to the <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>The server accepts the attacker-controlled <code>workspaceId</code>, <code>createdDate</code>, and <code>updatedDate</code> values without proper validation.</li>
<li>The assistant resource is reassigned to the attacker-specified workspace, breaking tenant isolation.</li>
<li>The attacker can now access and manipulate the reassigned assistant within the target workspace, potentially gaining unauthorized access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The mass assignment vulnerability in FlowiseAI allows authenticated users to perform unauthorized actions, including cross-workspace reassignment of assistants and modification of metadata. In multi-tenant deployments, this can lead to a complete breakdown of tenant isolation, allowing attackers to access and manipulate resources belonging to other tenants. The confirmed impacts include unauthorized modification of assistant metadata and cross-workspace data access. If successful, this can lead to data breaches, compliance violations, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect FlowiseAI Assistant WorkspaceId Manipulation</code> to detect attempts to modify the workspaceId parameter in the <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>Deploy the Sigma rule <code>Detect FlowiseAI Assistant Date Field Manipulation</code> to detect attempts to modify the createdDate or updatedDate parameters in the <code>/api/v1/assistants/{assistantId}</code> endpoint.</li>
<li>Upgrade FlowiseAI to a version greater than 3.1.1 to remediate the mass assignment vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass assignment</category><category>tenant isolation</category><category>flowiseai</category><category>web application</category></item><item><title>FlowiseAI Mass Assignment Vulnerability in Variable Update Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-05-flowise-mass-assignment/</link><pubDate>Thu, 14 May 2026 14:53:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-flowise-mass-assignment/</guid><description>FlowiseAI versions 3.1.1 and earlier contain a mass assignment vulnerability in the variable update endpoint allowing authenticated users to modify server-controlled properties like workspaceId, createdDate, and updatedDate, potentially breaking tenant isolation in multi-workspace environments (CVE-2026-42861).</description><content:encoded><![CDATA[<p>FlowiseAI, a low-code platform for building AI workflows, is vulnerable to a mass assignment flaw (CVE-2026-42861) affecting versions 3.1.1 and earlier.  The vulnerability resides in the <code>/api/v1/variables/{variableId}</code> endpoint, which is used for updating variable resources. Due to missing server-side validation, an authenticated attacker can modify critical, server-controlled properties such as <code>workspaceId</code>, <code>createdDate</code>, and <code>updatedDate</code>. This can lead to unauthorized cross-workspace reassignment of variables, potentially compromising tenant isolation in multi-tenant environments. The issue was reported in May 2026, and defenders need to implement mitigations to prevent unauthorized data access and manipulation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to FlowiseAI with valid user credentials.</li>
<li>Attacker identifies a target variable ID within the application they wish to manipulate.</li>
<li>Attacker crafts a malicious PUT request to <code>/api/v1/variables/{variableId}</code>.</li>
<li>The request body includes the <code>workspaceId</code> field, setting it to the ID of a different workspace the attacker wishes to access.</li>
<li>The request body may also include modified <code>createdDate</code> and <code>updatedDate</code> values for the variable.</li>
<li>The FlowiseAI server, lacking proper validation, accepts the attacker-supplied <code>workspaceId</code>, <code>createdDate</code>, and <code>updatedDate</code> values.</li>
<li>The server updates the variable in the database with the attacker-controlled values, effectively reassigning the variable to the attacker&rsquo;s chosen workspace.</li>
<li>The attacker can now access and potentially manipulate resources within the targeted workspace using the reassigned variable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows authenticated users to manipulate internal variable attributes, potentially leading to cross-workspace reassignment of variables, unauthorized modification of metadata, and tenant isolation bypass in multi-workspace deployments. This can allow an attacker to move variables between workspaces without proper authorization. The vulnerability affects FlowiseAI installations version 3.1.1 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and authorization checks on the <code>/api/v1/variables/{variableId}</code> endpoint to prevent modification of server-controlled properties like <code>workspaceId</code>, <code>createdDate</code>, and <code>updatedDate</code> as described in CVE-2026-42861.</li>
<li>Monitor PUT requests to the <code>/api/v1/variables/{variableId}</code> endpoint for attempts to modify the <code>workspaceId</code> parameter to detect potential exploitation attempts. Use the detection rule <code>Detect FlowiseAI Mass Assignment in Variable Update</code> to identify anomalous requests.</li>
<li>Implement workspace access controls and verify that users can only access variables within their assigned workspace, regardless of the <code>workspaceId</code> attribute.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mass assignment</category><category>tenant isolation</category><category>web application</category></item></channel></rss>