CVE-2026-32311

Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verification. Flowsint allows a user to create investigations, which are used to manage sketches and analyses. Sketches have controllable graphs, which are comprised of nodes and relationships. The sketches contain information on an OSINT target (usernames, websites, etc) within these nodes and relationships. The nodes can have automated processes execute on them called 'transformers'. A remote attacker can create a sketch, then trigger the 'org_to_asn' transform on an organization node to execute arbitrary OS commands as root on the host machine via shell metacharacters and a docker container escape. Commit b52cbbb904c8013b74308d58af88bc7dbb1b055c appears to remove the code that causes this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:reconurge:flowsint:*:*:*:*:*:*:*:*

History

23 Apr 2026, 18:41

Type Values Removed Values Added
First Time Reconurge
Reconurge flowsint
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:reconurge:flowsint:*:*:*:*:*:*:*:*
References () https://github.com/reconurge/flowsint/commit/b52cbbb904c8013b74308d58af88bc7dbb1b055c - () https://github.com/reconurge/flowsint/commit/b52cbbb904c8013b74308d58af88bc7dbb1b055c - Patch
References () https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 - () https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 - Exploit, Vendor Advisory

21 Apr 2026, 15:16

Type Values Removed Values Added
References () https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 - () https://github.com/reconurge/flowsint/security/advisories/GHSA-9g44-8xv2-f2m9 -

20 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-20 20:16

Updated : 2026-04-23 18:41


NVD link : CVE-2026-32311

Mitre link : CVE-2026-32311

CVE.ORG link : CVE-2026-32311


JSON object : View

Products Affected

reconurge

  • flowsint
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')