Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers to force the server to make arbitrary HTTP requests to internal and external systems. By injecting malicious prompt templates, attackers can bypass the intended API documentation constraints and redirect requests to sensitive internal services, potentially leading to internal network reconnaissance and data exfiltration. This vulnerability is fixed in 3.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-6r77-hqx7-7vw8 | Exploit Vendor Advisory |
| https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-6r77-hqx7-7vw8 | Exploit Vendor Advisory |
Configurations
History
24 Apr 2026, 16:37
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.3 |
| References | () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-6r77-hqx7-7vw8 - Exploit, Vendor Advisory | |
| First Time |
Flowiseai
Flowiseai flowise |
|
| CPE | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* |
23 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 20:16
Updated : 2026-04-24 16:37
NVD link : CVE-2026-41271
Mitre link : CVE-2026-41271
CVE.ORG link : CVE-2026-41271
JSON object : View
Products Affected
flowiseai
- flowise
CWE
CWE-918
Server-Side Request Forgery (SSRF)
