Impact
GraphCypherQAChain in Flowise forwards unfiltered user input into Cypher queries executed against a Neo4j database. The vulnerability permits injection of arbitrary Cypher commands, allowing an attacker to read, modify, or delete database contents. The flaw is a classic example of command injection, classified under CWE-943, and directly compromises data confidentiality, integrity, and availability.
Affected Systems
The affected products are FlowiseAI: Flowise and FlowiseAI: flowise-components. All installations using a version earlier than 3.1.0 are susceptible. Versions 3.1.0 and later include the fix that sanitizes user input before query execution.
Risk and Exploitability
The CVSS score of 9.3 reflects the severity of the injection. The EPSS score of less than 1% indicates that, as of the data snapshot, the probability of exploitation is low. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread exploitation. An attacker can exploit it remotely by entering malicious Cypher through the user interface; no special privileges are required beyond access to the Flowise application.
OpenCVE Enrichment
Github GHSA