Impact
A flaw in Flowise’s Custom Function feature lets authenticated users bypass the application’s SSRF controls because the built‑in Node.js http, https, and net modules are run inside the sandbox without equivalent protection. This bypass permits requests to internal network services, such as cloud metadata endpoints, which can expose credentials or other sensitive information. The vulnerability is characterized by CWE‑284 (improper access control) and CWE‑918 (server‑side request forgery).
Affected Systems
FlowiseAI’s Flowise UI and flowise‑components products, any deployment using Flowise prior to version 3.1.0. No specific sub‑version list is provided, so any release earlier than 3.1.0 is potentially affected.
Risk and Exploitability
The CVSS score is 7.1, indicating moderate‑to‑high severity. The EPSS score of less than 1 % suggests a very low probability of public exploitation at this time, and the vulnerability is not listed in the CISA KEV catalogue. Because the exploit requires authenticated access to Flowise, the attack surface is limited to users who can create or invoke Custom Functions; however, once authenticated, an attacker could target internal network resources. No known public exploits are reported.
OpenCVE Enrichment
Github GHSA