Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-24801 | Flowise OS command remote code execution |
![]() |
GHSA-2vv2-3x8x-4gv7 | Flowise OS command remote code execution |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* |
Mon, 18 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 CWE-862 |
|
Metrics |
ssvc
|
Sat, 16 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Flowiseai
Flowiseai flowise |
|
Vendors & Products |
Flowiseai
Flowiseai flowise |
Thu, 14 Aug 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands. | |
Title | Unsupervised OS command execution leads to remote code execution by unauthenticated network attackers | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-08-18T16:47:58.906Z
Reserved: 2025-08-13T13:30:26.091Z
Link: CVE-2025-8943

Updated: 2025-08-18T16:47:51.846Z

Status : Analyzed
Published: 2025-08-14T10:15:29.637
Modified: 2025-09-23T15:23:05.797
Link: CVE-2025-8943

No data.

Updated: 2025-08-16T21:41:32Z