VulnerabilitiesCRITICAL

Flowise Critical Vulnerability - Hackers Inject JavaScript

Featured image for Flowise Critical Vulnerability - Hackers Inject JavaScript
#CVE-2025-59528#Flowise#JavaScript Injection#MCP Node#VulnCheck

Original Reporting

CSCSO Online

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelCRITICAL

Active exploitation or massive impact — immediate action required

🛡️
🛡️ VULNERABILITY DETAILS
CVE ID
CVSS Score
Severity Rating
Affected Product
Vendor
Vulnerability Type
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Actively Exploited
Patch Available
Workaround Available
🎯

Basically, hackers found a way to sneak harmful code into Flowise software.

Quick Summary

What Happened Threat actors have discovered a critical flaw in the Flowise low-code platform, which is used for building custom large language models (LLMs) and agentic systems. This flaw allows attackers to inject arbitrary JavaScript code into the platform due to a design oversight in the Custom MCP node. This node is intended to connect an application’s AI agent

What Happened

Threat actors have discovered a critical flaw in the Flowise low-code platform, which is used for building custom large language models (LLMs) and agentic systems. This flaw allows attackers to inject arbitrary JavaScript code into the platform due to a design oversight in the Custom MCP node. This node is intended to connect an application’s AI agent to external tools via MCP servers.

The Flaw

The vulnerability, tracked as CVE-2025-59528, is rated at a maximum severity level of CVSS 10.0. It stems from improper validation of user-provided configurations for the MCP node, enabling attackers to execute arbitrary JavaScript without any security checks. This flaw was first disclosed in September 2025, and the latest version of Flowise, 3.1.1, includes a patch. However, many instances remain unpatched.

Who's Affected

According to a recent alert from VulnCheck, approximately 12,000 to 15,000 Flowise instances are exposed on the public internet. The first exploitation attempts were detected on April 6, 2026, indicating that hackers are actively targeting these vulnerable systems.

Signs of Exploitation

The exploitation of this flaw allows attackers to run JavaScript with full Node.js runtime privileges, which can lead to severe security breaches. The Custom MCP node parses user-supplied configurations and executes them directly, which is where the vulnerability lies. This lack of validation means that malicious actors can gain access to sensitive modules and execute harmful commands.

How to Protect Yourself

To mitigate the risks associated with this vulnerability, users of Flowise should:

  • Update to the latest version (3.1.1 or higher) immediately.
  • Review configurations in the Custom MCP node for any unvalidated inputs.
  • Monitor for any unusual activity on their Flowise instances.

Conclusion

The discovery of this flaw highlights the importance of thorough validation in software design, especially in platforms that facilitate AI workflows. As cyber threats evolve, maintaining robust security measures is essential to protect sensitive data and systems from exploitation.

Pro Insight

🔒 Pro insight: Analysis pending for this article.

Sources

Original Report

CSCSO Online
Read Original

Related Pings

HIGHVulnerabilities

Modbus ICS Devices Exposed - Threat to Critical Infrastructure

A recent study reveals that 179 Modbus ICS devices are exposed online, threatening critical infrastructure globally. Most affected devices are in the U.S., Sweden, and Turkey. Immediate security measures are essential to mitigate risks.

SC Media·
HIGHVulnerabilities

Qualcomm Security Advisory - April 2026 Vulnerabilities

Qualcomm has issued a security bulletin for April 2026, highlighting vulnerabilities in its products. Users are urged to apply updates to protect their devices. Failing to do so may expose systems to significant risks.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered

A critical vulnerability in RomM 4.4.0 allows attackers to take over admin accounts via XSS and CSRF. Users must update to version 4.4.1 to avoid risks. Stay safe!

Exploit-DB·
HIGHVulnerabilities

ZSH 5.9 Vulnerability - Remote Code Execution Exploit

A serious vulnerability in ZSH 5.9 allows remote code execution. This puts Linux systems at significant risk. Users are urged to update their software and monitor for suspicious activity.

Exploit-DB·
HIGHVulnerabilities

Jumbo Website Manager - Remote Code Execution Vulnerability

A serious vulnerability in Jumbo Website Manager allows remote code execution, risking user data and server security. Organizations should take immediate steps to protect their systems.

Exploit-DB·
HIGHVulnerabilities

GPL Odorizers GPL750 - Vulnerability Exposed Critical Flaw

A serious vulnerability in GPL Odorizers GPL750 could allow remote attackers to manipulate gas line odorant levels. Users are urged to update their systems immediately to mitigate risks.

CISA Advisories·