CVE-2026-31829

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow that performs server-side HTTP requests using user-controlled URLs. By default, there are no restrictions on target hosts, including private/internal IP ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force the Flowise server to make requests to internal network resources that are inaccessible from the public internet. This vulnerability is fixed in 3.0.13.
References
Link Resource
https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-fvcw-9w9r-pxc7 Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*

History

11 Mar 2026, 14:24

Type Values Removed Values Added
References () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-fvcw-9w9r-pxc7 - () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-fvcw-9w9r-pxc7 - Exploit, Mitigation, Vendor Advisory
First Time Flowiseai
Flowiseai flowise
CPE cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*

11 Mar 2026, 13:52

Type Values Removed Values Added
Summary
  • (es) Flowise es una interfaz de usuario de arrastrar y soltar para construir un flujo de modelo de lenguaje grande personalizado. Antes de la versión 3.0.13, Flowise expone un Nodo HTTP en AgentFlow y Chatflow que realiza peticiones HTTP del lado del servidor utilizando URLs controladas por el usuario. Por defecto, no hay restricciones en los hosts de destino, incluyendo rangos de IP privados/internos (RFC 1918), localhost, o puntos finales de metadatos en la nube. Esto permite la Falsificación de Petición del Lado del Servidor (SSRF), permitiendo a cualquier usuario que interactúa con un chatflow expuesto públicamente forzar al servidor Flowise a realizar peticiones a recursos de red internos que son inaccesibles desde la internet pública. Esta vulnerabilidad está corregida en la versión 3.0.13.

10 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-10 22:16

Updated : 2026-03-11 14:24


NVD link : CVE-2026-31829

Mitre link : CVE-2026-31829

CVE.ORG link : CVE-2026-31829


JSON object : View

Products Affected

flowiseai

  • flowise
CWE
CWE-918

Server-Side Request Forgery (SSRF)