Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass the allow/deny lists via DNS Rebinding (Time-of-Check Time-of-Use) or by exploiting the default configuration which fails to enforce any deny list. This vulnerability is fixed in 3.1.0.
Published: 2026-04-23
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Server Side Request Forgery
Action: Patch immediately
AI Analysis

Impact

Flowise versions before 3.1.0 contain logic errors in the secureAxiosRequest and secureFetch wrappers that were designed to block Server‑Side Request Forgery. These flaws allow a bypass of the allow/deny lists through DNS rebinding (a Time‑of‑Check Time‑of‑Use race) or by exploiting the default configuration, which does not enforce any deny list at all. The result is that an attacker can cause the Flowise application to issue arbitrary outbound HTTP or HTTPS requests to internal or external hosts, potentially exposing sensitive data or serving as a foothold for further attacks.

Affected Systems

All releases of Flowise and flowise-components from FlowiseAI earlier than version 3.1.0 are affected. The vulnerability was fixed in the 3.1.0 release of both the application and its components.

Risk and Exploitability

The EPSS score of less than 1% indicates a very low current probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The CVSS score of 7.1 reflects a high impact on confidentiality and integrity because the flaw permits arbitrary outbound requests that could be used to enumerate internal services, exfiltrate data, or pivot to other systems. Based on the description, it is inferred that an attacker would need to reach the Flowise instance over its web interface to trigger the SSRF bypass; no explicit credential requirement is stated in the advisory.

Generated by OpenCVE AI on April 28, 2026 at 20:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Flowise to version 3.1.0 or later
  • Configure a deny list to block outbound requests to untrusted destinations, ensuring the allow/deny logic is actively enforced
  • Limit the network scope of the Flowise process so that outbound traffic is permitted only to essential services

Generated by OpenCVE AI on April 28, 2026 at 20:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2x8m-83vc-6wv4 Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure)
History

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai flowise-components
Vendors & Products Flowiseai flowise-components

Fri, 24 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai
Flowiseai flowise
CPEs cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
Vendors & Products Flowiseai
Flowiseai flowise

Thu, 23 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass the allow/deny lists via DNS Rebinding (Time-of-Check Time-of-Use) or by exploiting the default configuration which fails to enforce any deny list. This vulnerability is fixed in 3.1.0.
Title Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure)
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Flowiseai Flowise Flowise-components
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T20:18:56.831Z

Reserved: 2026-04-18T14:01:46.801Z

Link: CVE-2026-41272

cve-icon Vulnrichment

Updated: 2026-04-23T20:18:46.344Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T20:16:15.810

Modified: 2026-04-24T16:37:31.410

Link: CVE-2026-41272

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T20:30:06Z

Weaknesses