Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user (e.g., public Wi-Fi) can intercept the reset link and gain unauthorized access to the victim’s account. This vulnerability is fixed in 3.1.0.
Published: 2026-04-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized account access via intercepted password reset link
Action: Upgrade
AI Analysis

Impact

Flowise, a drag & drop interface to build large‑language‑model flows, sent password reset links over insecure HTTP until version 3.1.0. The link was transmitted in plain text, so an attacker on the same network could capture the URL and use it to reset the user’s password. Once the attacker obtains the new password, they gain full access to the victim’s account, exposing any data stored or processed by the Flowise flow. This is an insecure transmission weakness (CWE‑319) that compromises the confidentiality and integrity of the authentication mechanism.

Affected Systems

The vulnerability affects all installations of Flowise on cloud.flowiseai.com that run a version earlier than 3.1.0. The vendor is FlowiseAI, and the product is Flowise. Users relying on the cloud service without updating to version 3.1.0 or later are exposed.

Risk and Exploitability

The CVSS score of 7.5 rates this issue as high severity, and the EPSS score of less than 1 % indicates that it is rarely exploited in the wild but still presents a realistic threat to users on open or public networks. The vulnerability is not listed in the CISA KEV catalog, suggesting no large‑scale exploitation campaigns are known. An attacker would need only network access to the victim’s device or Wi‑Fi and would not require any privileged access to the Flowise backend. If the user clicks the intercepted HTTP link, the attacker can reset the password and hijack the account, achieving full account takeover.

Generated by OpenCVE AI on April 28, 2026 at 07:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the 3.1.0 patch or newer to ensure password reset links are sent over HTTPS.
  • Verify that the password reset endpoint is served exclusively over HTTPS by testing the link or inspecting the response headers.
  • Disable or remove any HTTP endpoints for password reset to prevent accidental insecure usage.

Generated by OpenCVE AI on April 28, 2026 at 07:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x5w6-38gp-mrqh Flowise: Password Reset Link Sent Over Unsecured HTTP
History

Sat, 25 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai
Flowiseai flowise
CPEs cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
Vendors & Products Flowiseai
Flowiseai flowise
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Thu, 23 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user (e.g., public Wi-Fi) can intercept the reset link and gain unauthorized access to the victim’s account. This vulnerability is fixed in 3.1.0.
Title Flowise: Password Reset Link Sent Over Unsecured HTTP
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Flowiseai Flowise
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-25T01:29:51.919Z

Reserved: 2026-04-18T14:01:46.802Z

Link: CVE-2026-41275

cve-icon Vulnrichment

Updated: 2026-04-25T01:29:12.280Z

cve-icon NVD

Status : Modified

Published: 2026-04-23T20:16:16.117

Modified: 2026-04-25T02:16:02.710

Link: CVE-2026-41275

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T07:30:26Z

Weaknesses