Skip to content
Threat Feed

Vendor

FlowiseAI

13 briefs RSS
high threat

FlowiseAI OpenAI Assistants Vector Store Missing Authentication

FlowiseAI versions 3.1.1 and earlier are vulnerable to a privilege escalation due to missing authentication and permission checks on the OpenAI Assistants Vector Store CRUD endpoints, allowing any authenticated user to create, modify, upload files to, and delete vector stores and files, regardless of their assigned permissions.

flowise privilege-escalation missing-authentication crud
2r 1t
high advisory

FlowiseAI Cross-Workspace Assistant Takeover via Mass Assignment

FlowiseAI is vulnerable to a mass assignment vulnerability in the Assistant controller/service allowing an attacker, authenticated as a member of one workspace, to move an assistant (including configurations, instructions, tools and credentials) to another workspace by overwriting the `workspaceId` and `id` fields in the request body, leading to cross-workspace data takeover and IDOR.

flowise <= 3.1.1 mass-assignment cross-workspace flowiseai
2r
high advisory

FlowiseAI CustomTemplate Mass Assignment Allows Cross-Workspace Template Takeover

FlowiseAI is vulnerable to cross-workspace data takeover due to mass assignment in the CustomTemplate controller, allowing an attacker to move templates to other workspaces by overwriting the `workspaceId` via API request.

Flowise <= 3.1.1 mass-assignment cross-workspace privilege-escalation
2r 1t
high advisory

FlowiseAI Cross-Workspace Dataset Takeover via Mass Assignment

FlowiseAI is vulnerable to a mass assignment vulnerability via `Object.assign(entity, body)` which allows a client-controlled `workspaceId` to be overwritten on the Dataset entity, leading to cross-workspace data takeover and IDOR.

flowise mass-assignment cross-workspace idor flowiseai
2r 1t
high advisory

FlowiseAI DatasetRow Mass Assignment Allows Cross-Workspace Data Takeover

FlowiseAI is vulnerable to a mass assignment vulnerability in the DatasetRow controller/service, allowing an authenticated attacker to overwrite the `workspaceId` and `id` of a DatasetRow entity, leading to cross-workspace data takeover and IDOR.

flowise <= 3.1.1 mass-assignment idor cross-workspace
2r 1t
high advisory

FlowiseAI Evaluation Cross-Workspace Data Takeover via Mass Assignment

FlowiseAI is vulnerable to a mass assignment vulnerability (fixed in PR 6050) that allows authenticated users to move Evaluation entities between workspaces by overwriting the `workspaceId` field via API request, leading to unauthorized data access.

flowise +1 mass-assignment cross-workspace privilege-escalation
2r 1t
high threat

FlowiseAI Evaluator Cross-Workspace Takeover via Mass Assignment

FlowiseAI is vulnerable to a mass assignment vulnerability in the Evaluator controller/service, where an attacker can manipulate the `workspaceId` during evaluator creation or updates, leading to cross-workspace data takeover and IDOR.

flowise <= 3.1.1 +1 mass-assignment idor privilege-escalation cloud
2r 1t
high advisory

FlowiseAI Mass Assignment in Assistant Update Endpoint Allows Cross-Workspace Resource Reassignment

FlowiseAI version 3.1.1 and earlier contains a mass assignment vulnerability in the assistant update endpoint, allowing authenticated users to modify server-controlled properties like workspaceId, createdDate, and updatedDate, enabling cross-workspace reassignment of assistants and breaking tenant isolation in multi-workspace environments.

FlowiseAI mass assignment tenant isolation web application
2r 1t
high advisory

FlowiseAI Credential Data Leak via Filtered API Request

FlowiseAI versions 3.1.1 and earlier leak encrypted credential data when API requests include a `credentialName` filter, potentially leading to full credential theft if combined with access to the encryption key.

flowise credential-access data-leak web-application
2r 1t
critical advisory

FlowiseAI Authenticated Remote Code Execution via NodeVM Sandbox Escape

FlowiseAI is vulnerable to authenticated remote code execution (RCE) due to a missing route-level authorization in the `/api/v1/node-custom-function` endpoint, allowing any authenticated user to execute arbitrary JavaScript and escape the NodeVM sandbox to run system commands.

flowise <= 3.1.1 rce sandbox-escape nodevm
2r 1t
high advisory

FlowiseAI Chatflow Update Endpoint Mass Assignment Vulnerability

A mass assignment vulnerability exists in FlowiseAI's chatflow update endpoint (CVE-2026-42863), allowing authenticated users to modify server-controlled properties like `deployed`, `isPublic`, and `workspaceId` due to missing server-side validation, leading to cross-workspace resource reassignment and unauthorized modification of deployment and visibility settings.

flowise mass-assignment privilege-escalation cross-workspace flowiseai
2r 2t
medium advisory

FlowiseAI Exposes Basic Auth Credentials via API

FlowiseAI exposes a basic authentication endpoint without rate limiting, allowing attackers to brute-force credentials and gain unauthorized access to the application.

flowise credential-access brute-force flowiseai
2r 1t
high advisory

FlowiseAI Mass Assignment Vulnerability in Variable Update Endpoint

FlowiseAI versions 3.1.1 and earlier contain a mass assignment vulnerability in the variable update endpoint allowing authenticated users to modify server-controlled properties like workspaceId, createdDate, and updatedDate, potentially breaking tenant isolation in multi-workspace environments (CVE-2026-42861).

flowise <= 3.1.1 mass assignment tenant isolation web application
2r