Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, a Server-Side Request Forgery (SSRF) vulnerability was discovered in the /api/v1/fetch-links endpoint of the Flowise application. This vulnerability allows an attacker to use the Flowise server as a proxy to access internal network web services and explore their link structures. This issue has been patched in version 3.0.6.
References
Configurations
History
23 Sep 2025, 16:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/components/src/utils.ts#L474-L478 - Product | |
References | () https://github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/controllers/fetch-links/index.ts#L6-L24 - Product | |
References | () https://github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/services/fetch-links/index.ts#L8-L18 - Product | |
References | () https://github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.6 - Release Notes | |
References | () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-hr92-4q35-4j3m - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:flowiseai:flowise:3.0.5:*:*:*:*:*:*:* | |
First Time |
Flowiseai flowise
Flowiseai |
22 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-22 20:15
Updated : 2025-09-23 16:47
NVD link : CVE-2025-59527
Mitre link : CVE-2025-59527
CVE.ORG link : CVE-2025-59527
JSON object : View
Products Affected
flowiseai
- flowise
CWE
CWE-918
Server-Side Request Forgery (SSRF)