Description
A vulnerability was detected in FlowiseAI Flowise up to 3.0.12. This affects the function verify of the file packages/server/src/enterprise/services/account.service.ts of the component Endpoint. Performing a manipulation results in information disclosure. Remote exploitation of the attack is possible. The attack is considered to have high complexity. It is indicated that the exploitability is difficult. The exploit is now public and may be used. Upgrading the affected component is recommended.
Published: 2026-05-06
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The verify function in the account.service.ts of Flowise’s Endpoint component can be manipulated to expose sensitive data. The flaw allows remote callers to retrieve information that should not be disclosed, and although the attack requires high complexity and is described as difficult, the exploit is already public.

Affected Systems

FlowiseAI Flowise versions up to and including 3.0.12 are vulnerable. The affected component is the Endpoint service used for account verification. Any deployment of Flowise running these versions may expose confidential data if the verification endpoint is reachable from outside the trusted network.

Risk and Exploitability

The CVSS score of 6.3 places this vulnerability in the moderate range. EPSS score is <1%, and the vulnerability is not listed in CISA’s KEV catalog. Attackers can target the endpoint remotely; the high attack complexity and difficulty of exploitation suggest that successful compromise is not trivial, but the existence of a public exploit increases the risk to exposed systems.

Generated by OpenCVE AI on May 7, 2026 at 17:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Flowise to a version newer than 3.0.12 or apply the vendor’s patch for the account.verification flaw.
  • If an upgrade is not immediately available, restrict access to the account.verification endpoint by firewall rules or network segmentation to limit exposure to trusted internal hosts.
  • As an additional precaution, disable or restrict the account verification functionality for untrusted users until a patched release is deployed.

Generated by OpenCVE AI on May 7, 2026 at 17:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo

Wed, 06 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in FlowiseAI Flowise up to 3.0.12. This affects the function verify of the file packages/server/src/enterprise/services/account.service.ts of the component Endpoint. Performing a manipulation results in information disclosure. Remote exploitation of the attack is possible. The attack is considered to have high complexity. It is indicated that the exploitability is difficult. The exploit is now public and may be used. Upgrading the affected component is recommended.
Title FlowiseAI Flowise Endpoint account.service.ts verify information disclosure
First Time appeared Flowiseai
Flowiseai flowise
Weaknesses CWE-200
CWE-284
CPEs cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
Vendors & Products Flowiseai
Flowiseai flowise
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Flowiseai Flowise
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-06T14:35:31.158Z

Reserved: 2026-05-06T07:40:41.272Z

Link: CVE-2026-8028

cve-icon Vulnrichment

Updated: 2026-05-06T14:35:27.498Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-06T15:16:13.210

Modified: 2026-05-07T14:47:19.257

Link: CVE-2026-8028

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T17:15:16Z