Remote Command Execution Vulnerability in Flowsint by Reconurge
CVE-2026-32311

9.3CRITICAL

Key Information:

Vendor

Reconurge

Status
Vendor
CVE Published:
20 April 2026

What is CVE-2026-32311?

Flowsint, an open-source OSINT graph exploration tool by Reconurge, is susceptible to a remote command execution vulnerability. This arises when a remote attacker creates a sketch and triggers the 'org_to_asn' transformer on an organization node, leading to the execution of arbitrary OS commands as root on the host machine. This is facilitated through the use of shell metacharacters and can compromise the entire system, potentially allowing the attacker to gain full control. A recent code commit has been made to address this issue by removing the vulnerable code.

Affected Version(s)

flowsint < b52cbbb904c8013b74308d58af88bc7dbb1b055c

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.