CVE-2026-41268

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined with a NODE_OPTIONS environment variable injection. This allows for the execution of arbitrary system commands with root privileges within the containerized Flowise instance, requiring only a single HTTP request and no authentication or knowledge of the instance. This vulnerability is fixed in 3.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*

History

24 Apr 2026, 15:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.7
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
First Time Flowiseai
Flowiseai flowise
References () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-cvrr-qhgw-2mm6 - () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-cvrr-qhgw-2mm6 - Exploit, Vendor Advisory

23 Apr 2026, 21:16

Type Values Removed Values Added
References () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-cvrr-qhgw-2mm6 - () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-cvrr-qhgw-2mm6 -

23 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 20:16

Updated : 2026-04-24 15:14


NVD link : CVE-2026-41268

Mitre link : CVE-2026-41268

CVE.ORG link : CVE-2026-41268


JSON object : View

Products Affected

flowiseai

  • flowise
CWE
CWE-20

Improper Input Validation