Impact
The vulnerability is a missing authentication check on the NVIDIA NIM router endpoints in Flowise. Because the /api/v1/nvidia-nim/* route is whitelisted in the global authentication middleware, any user can access privileged endpoints that create or manage containers and generate tokens. An attacker could therefore initiate or control container operations without authorization, potentially gaining unauthorized administrative privileges and discovering sensitive tokens. This flaw is classified as CWE‑306, unauthorized access to privileged resources.
Affected Systems
Flowise users operating versions prior to 3.0.13 are impacted. The vulnerability is present in all builds of Flowise up to but not including the 3.0.13 release. Producers of the Flowise open‑source project are listed as FlowiseAI:Flowise.
Risk and Exploitability
CVSS score of 7.7 indicates a high severity. The EPSS score (12 %) suggests a moderately low likelihood of exploitation in the wild at present, and the vulnerability is not currently reported in the CISA Known Exploited Vulnerabilities catalog. Nevertheless, the lack of authentication allows attackers to reach container management functions over an unprotected HTTP API, which could be a gateway to further privilege escalation if the host and underlying infrastructure are not secured. The primary attack vector is via unauthenticated HTTP requests to the /api/v1/nvidia-nim/* endpoint, and no additional preconditions are required beyond accessibility to the Flowise instance.
OpenCVE Enrichment
Github GHSA