Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, Flowise trusts any HTTP client that sets the header x-request-from: internal, allowing an authenticated tenant session to bypass all /api/v1/** authorization checks. With only a browser cookie, a low-privilege tenant can invoke internal administration endpoints (API key management, credential stores, custom function execution, etc.), effectively escalating privilege. This issue has been patched in version 3.0.13.
Published: 2026-03-07
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Flowise, a drag‑and‑drop interface for building custom large language model flows, had a flaw that allowed any client setting the HTTP header x‑request‑from to "internal" to bypass all /api/v1/ authorization checks. Because an authenticated tenant session stores a browser cookie, a low‑privilege user could set that header and invoke internal administrative endpoints such as API key management, credential stores, and custom function execution, effectively escalating privileges. The CWE identified is 863 – Change Authentication Setting.

Affected Systems

All installations of Flowise by FlowiseAI prior to version 3.0.13. The vulnerability affects the Flowise product regardless of deployment environment, as the header check is performed internally within the application.

Risk and Exploitability

The CVSS v3 score is 8.7, indicating a high level of severity. The EPSS score is less than 1 %, suggesting that exploitation is unlikely but not impossible. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to authenticate to obtain a valid session cookie; the x‑request‑from header can then be spoofed in HTTP requests. The likely attack vector is remote via the web interface or API; the necessary prerequisites are access to any authenticated tenant session and the ability to manipulate HTTP headers, which are common capabilities for users with browser or API client access.

Generated by OpenCVE AI on April 16, 2026 at 11:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Flowise to version 3.0.13 or later, which removes the trust of spoofed x‑request‑from headers.
  • If upgrading is not immediately feasible, configure the application or reverse‑proxy to reject or strip the x‑request‑from header from external requests, ensuring it can only be set internally.
  • Review and enforce strict authorization checks on all /api/v1/ endpoints, confirming that no future releases allow bypass based on header values.

Generated by OpenCVE AI on April 16, 2026 at 11:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wvhq-wp8g-c7vq Flowise has Authorization Bypass via Spoofed x-request-from Header
History

Wed, 11 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai
Flowiseai flowise
Vendors & Products Flowiseai
Flowiseai flowise

Sat, 07 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, Flowise trusts any HTTP client that sets the header x-request-from: internal, allowing an authenticated tenant session to bypass all /api/v1/** authorization checks. With only a browser cookie, a low-privilege tenant can invoke internal administration endpoints (API key management, credential stores, custom function execution, etc.), effectively escalating privilege. This issue has been patched in version 3.0.13.
Title Flowise Authorization Bypass via Spoofed x-request-from Header
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Flowiseai Flowise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:44:25.008Z

Reserved: 2026-03-05T21:06:44.605Z

Link: CVE-2026-30820

cve-icon Vulnrichment

Updated: 2026-03-09T20:35:44.549Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T05:16:26.243

Modified: 2026-03-11T13:46:22.463

Link: CVE-2026-30820

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:15:27Z

Weaknesses