Insecure API Exposure in Flowise Interface by FlowiseAI
CVE-2026-41278

8.7HIGH

Key Information:

Vendor

Flowiseai

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41278?

Flowise, a user-friendly platform for building customized large language models, has a significant security issue that affects its API functionality. Versions before 3.1.0 allow unauthenticated users to access sensitive data via the GET /api/v1/public-chatflows/:id endpoint. This endpoint inadvertently discloses full chatflow objects without proper sanitization, revealing critical information such as credential IDs, plaintext API keys, and even password fields. This security flaw was further assessed during Docker validation, identifying that the intended sanitizeFlowDataForPublicEndpoint function was entirely missing in version 3.0.13. Users are advised to upgrade to version 3.1.0 or later to mitigate this vulnerability.

Affected Version(s)

Flowise < 3.1.0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.