Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow that performs server-side HTTP requests using user-controlled URLs. By default, there are no restrictions on target hosts, including private/internal IP ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force the Flowise server to make requests to internal network resources that are inaccessible from the public internet. This vulnerability is fixed in 3.0.13.
References
| Link | Resource |
|---|---|
| https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-fvcw-9w9r-pxc7 | Exploit Mitigation Vendor Advisory |
Configurations
History
11 Mar 2026, 14:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-fvcw-9w9r-pxc7 - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Flowiseai
Flowiseai flowise |
|
| CPE | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* |
11 Mar 2026, 13:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 22:16
Updated : 2026-03-11 14:24
NVD link : CVE-2026-31829
Mitre link : CVE-2026-31829
CVE.ORG link : CVE-2026-31829
JSON object : View
Products Affected
flowiseai
- flowise
CWE
CWE-918
Server-Side Request Forgery (SSRF)
