Impact
Agentflow, a product from Flowring, contains an arbitrary file upload flaw that permits authenticated remote users to upload files that the server subsequently executes as code. The vulnerability is classified as CWE-434, meaning the application fails to validate the type and content of uploaded files. When exploited, an attacker can deploy a web shell or other malicious payload to run arbitrary commands on the web server, fully compromising confidentiality, integrity, and availability of the affected system.
Affected Systems
The exposed product is Flowring Agentflow. No specific version numbers are listed in the available CNA data, so any deployed instance of Agentflow could be vulnerable unless the vendor has issued an update. The lack of version information means administrators should assume all installations require assessment.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, and the EPSS score, while below 1 percent, shows some low but non-zero exploitation probability. The vulnerability is not currently catalogued in CISA’s KEV list. Attackers would first need to obtain authenticated access to the Agentflow web interface, after which they can upload a malicious file typically via a non‑validated upload endpoint. No specific public exploits are documented, but the description confirms that a web shell can be executed.
OpenCVE Enrichment