Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the CSV_Agents class. The issue results from the lack of proper sandboxing when evaluating an LLM generated python script. An attacker can leverage this vulnerability to execute code in the context of the user running the server. Using prompt injection techniques, an unauthenticated attacker with the ability to send prompts to a chatflow using the CSV Agent node may convince an LLM to respond with a malicious python script that executes attacker controlled commands on the Flowise server. This vulnerability is fixed in 3.1.0.
Published: 2026-04-23
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Flowise is a drag‑and‑drop interface for building large‑language‑model flows. A flaw in the run method of the CSV_Agents class before version 3.1.0 allows attacker‑generated Python scripts to be executed in the context of the user running the Flowise server. The problem arises from a lack of sandboxing when evaluating LLM‑generated code, giving the attacker the ability to have the server run arbitrary commands through prompt injection into a chatflow that uses the CSV Agent node. This vulnerability can compromise confidentiality, integrity, and availability if exploited.

Affected Systems

All FlowiseAI Flowise installations prior to version 3.1.0 are affected. The flaw exists in the CSV Agent node and can be triggered by any chatflow that uses that node, regardless of the user’s authentication status.

Risk and Exploitability

The CVSS score for this issue is 9.2, indicating critical severity. The EPSS score is below 1%, suggesting a low likelihood of widespread exploitation at present, but the vulnerability is still listed as a remote code execution flaw, and it is not currently part of the CISA KEV catalog. An unauthenticated attacker can send crafted prompts to a chatflow using the CSV Agent node, potentially coaxing the LLM into generating malicious Python code that runs with server privileges. The attack can be performed from any network location that can reach the Flowise instance.

Generated by OpenCVE AI on April 28, 2026 at 14:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Flowise to version 3.1.0 or later, which removes the unsandboxed script execution path.
  • If an upgrade is not immediately possible, disable or remove the CSV Agent node from any accessible chatflows and enforce strict authentication and authorization controls against the Flowise API.
  • Implement input validation and sanitization on any LLM‑generated code before execution, ensuring that only trusted scripts are run in a secure, isolated environment.

Generated by OpenCVE AI on April 28, 2026 at 14:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3hjv-c53m-58jj Flowise: CSV Agent Prompt Injection Remote Code Execution Vulnerability
History

Fri, 24 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai
Flowiseai flowise
CPEs cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
Vendors & Products Flowiseai
Flowiseai flowise
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 24 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the CSV_Agents class. The issue results from the lack of proper sandboxing when evaluating an LLM generated python script. An attacker can leverage this vulnerability to execute code in the context of the user running the server. Using prompt injection techniques, an unauthenticated attacker with the ability to send prompts to a chatflow using the CSV Agent node may convince an LLM to respond with a malicious python script that executes attacker controlled commands on the Flowise server. This vulnerability is fixed in 3.1.0.
Title Flowise: CSV Agent Prompt Injection Remote Code Execution Vulnerability
Weaknesses CWE-184
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Flowiseai Flowise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-24T13:39:10.217Z

Reserved: 2026-04-18T14:01:46.801Z

Link: CVE-2026-41264

cve-icon Vulnrichment

Updated: 2026-04-24T13:38:54.179Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T20:16:14.750

Modified: 2026-04-24T15:15:17.923

Link: CVE-2026-41264

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:45:16Z

Weaknesses