Impact
Flowise, a drag‑and‑drop interface for building large‑language‑model flows, suffered a mass assignment flaw in the \/api\/v1\/leads endpoint. In versions prior to 3.0.13, unauthenticated users could supply arbitrary values that were stored directly in internal database fields. This weakness corresponds to CWE‑915 and allows malicious actors to alter data that should be protected, potentially compromising the integrity of lead records and the overall system configuration.
Affected Systems
The affected product is FlowiseAI Flowise. All releases older than version 3.0.13 are vulnerable. Versions 3.0.13 and later contain the fix.
Risk and Exploitability
The CVSS score of 7.7 indicates a high severity, yet the EPSS score of less than 1 % implies a very low exploitation probability at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by sending unauthenticated HTTP requests to the /api/v1/leads endpoint and supply crafted payloads. No authentication or privileged access is required, but the low EPSS suggests it is not yet a common target. Nevertheless, the potential for uncontrolled data alteration warrants prompt mitigation.
OpenCVE Enrichment
Github GHSA