Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input is directly applied to the question parameter within the prompt template and it is reflected to the Python code without any sanitization. This vulnerability is fixed in 3.1.0.
Published: 2026-04-23
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Flowise is a drag‑and‑drop interface for building large‑language‑model flows. An unvalidated user input in AirtableAgent.ts leads to direct insertion into a Pandas‑based Python prompt, enabling arbitrary code execution. The flaw allows execution of arbitrary Python code with the privileges of the Flowise process, potentially affecting confidentiality, integrity, and availability.

Affected Systems

Flowise AI Flowise versions older than 3.1.0 are affected. Version 3.1.0 and later contain the fix that validates prompt inputs before execution.

Risk and Exploitability

The CVSS score of 8.8 classifies the vulnerability as high severity. The EPSS score of less than 1% indicates a very low likelihood of exploitation today, and it is not yet listed in the CISA KEV catalog. The likely attack vector is a remote attacker sending a crafted prompt through the Flowise web interface; by leveraging the lack of sanitization the attacker can inject malicious Python code that the backend executes with the privileges of the Flowise process.

Generated by OpenCVE AI on April 28, 2026 at 14:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Flowise to version 3.1.0 or later to apply the vendor patch.
  • If an upgrade is not immediately possible, limit user permissions so that only trusted administrators can compose prompts, or disable Pandas functionality in the AirtableAgent component.
  • Add application‑level sanitization to all user‑supplied prompt variables to prevent unsanitized Python code execution.

Generated by OpenCVE AI on April 28, 2026 at 14:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-f228-chmx-v6j6 Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using `Pandas`.
History

Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai
Flowiseai flowise
CPEs cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
Vendors & Products Flowiseai
Flowiseai flowise
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 23 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input is directly applied to the question parameter within the prompt template and it is reflected to the Python code without any sanitization. This vulnerability is fixed in 3.1.0.
Title Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas.
Weaknesses CWE-94
References
Metrics cvssV3_0

{'score': 8.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Flowiseai Flowise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-24T18:20:34.172Z

Reserved: 2026-04-17T12:59:15.738Z

Link: CVE-2026-41138

cve-icon Vulnrichment

Updated: 2026-04-24T14:18:57.408Z

cve-icon NVD

Status : Modified

Published: 2026-04-23T20:16:14.380

Modified: 2026-04-24T19:17:11.260

Link: CVE-2026-41138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T15:00:14Z

Weaknesses