Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in version 3.0.13.
Published: 2026-03-07
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Modification via Mass Assignment
Action: Immediate Patch
AI Analysis

Impact

Flowise, a drag‑and‑drop interface for building large‑language‑model flows, suffered a mass assignment flaw in the \/api\/v1\/leads endpoint. In versions prior to 3.0.13, unauthenticated users could supply arbitrary values that were stored directly in internal database fields. This weakness corresponds to CWE‑915 and allows malicious actors to alter data that should be protected, potentially compromising the integrity of lead records and the overall system configuration.

Affected Systems

The affected product is FlowiseAI Flowise. All releases older than version 3.0.13 are vulnerable. Versions 3.0.13 and later contain the fix.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity, yet the EPSS score of less than 1 % implies a very low exploitation probability at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by sending unauthenticated HTTP requests to the /api/v1/leads endpoint and supply crafted payloads. No authentication or privileged access is required, but the low EPSS suggests it is not yet a common target. Nevertheless, the potential for uncontrolled data alteration warrants prompt mitigation.

Generated by OpenCVE AI on April 16, 2026 at 11:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Flowise to version 3.0.13 or newer, which removes the mass assignment vulnerability.
  • Verify that the upgrade enforces proper authentication for the /api/v1/leads endpoint and protects internal database fields from arbitrary input.
  • If an upgrade cannot occur immediately, temporarily restrict or disable access to the /api/v1/leads endpoint for unauthenticated users to prevent further data compromise.

Generated by OpenCVE AI on April 16, 2026 at 11:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mq4r-h2gh-qv7x Flowise Allows Mass Assignment in `/api/v1/leads` Endpoint
History

Wed, 11 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai
Flowiseai flowise
Vendors & Products Flowiseai
Flowiseai flowise

Sat, 07 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in version 3.0.13.
Title Flowise: Mass Assignment in `/api/v1/leads` Endpoint
Weaknesses CWE-915
References
Metrics cvssV3_0

{'score': 7.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Flowiseai Flowise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:44:24.747Z

Reserved: 2026-03-05T21:06:44.605Z

Link: CVE-2026-30822

cve-icon Vulnrichment

Updated: 2026-03-09T20:35:40.470Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T05:16:27.483

Modified: 2026-03-11T13:40:13.250

Link: CVE-2026-30822

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:15:27Z

Weaknesses