Unauthenticated Remote Command Execution Vulnerability in Flowise by FlowiseAI
CVE-2026-41268

7.7HIGH

Key Information:

Vendor

Flowiseai

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41268?

Flowise, created for building customized large language model flows, was susceptible to an unauthenticated remote command execution vulnerability prior to version 3.1.0. This flaw allowed attackers to execute arbitrary system commands with root privileges within the containerized environment by leveraging a parameter override bypass technique through the FILE-STORAGE:: keyword, along with NODE_OPTIONS environment variable injection. Successful exploitation required only a single HTTP request, with no authentication or knowledge of the instance necessary. This vulnerability was addressed in the 3.1.0 release, underscoring the importance of updating immediately.

Affected Version(s)

Flowise < 3.1.0

References

CVSS V3.0

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.