Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verification. Flowsint allows a user to create investigations, which are used to manage sketches and analyses. Sketches have controllable graphs, which are comprised of nodes and relationships. The sketches contain information on an OSINT target (usernames, websites, etc) within these nodes and relationships. The nodes can have automated processes execute on them called 'transformers'. A remote attacker can create a sketch, then trigger the 'org_to_asn' transform on an organization node to execute arbitrary OS commands as root on the host machine via shell metacharacters and a docker container escape. Commit b52cbbb904c8013b74308d58af88bc7dbb1b055c appears to remove the code that causes this issue.
References
| Link | Resource |
|---|---|
| https://github.com/reconurge/flowsint/commit/b52cbbb904c8013b74308d58af88bc7dbb1b055c | Patch |
| https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 | Exploit Vendor Advisory |
| https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 | Exploit Vendor Advisory |
Configurations
History
23 Apr 2026, 18:41
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Reconurge
Reconurge flowsint |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:reconurge:flowsint:*:*:*:*:*:*:*:* | |
| References | () https://github.com/reconurge/flowsint/commit/b52cbbb904c8013b74308d58af88bc7dbb1b055c - Patch | |
| References | () https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 - Exploit, Vendor Advisory |
21 Apr 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 - |
20 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-20 20:16
Updated : 2026-04-23 18:41
NVD link : CVE-2026-32311
Mitre link : CVE-2026-32311
CVE.ORG link : CVE-2026-32311
JSON object : View
Products Affected
reconurge
- flowsint
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
