CVE-2026-41272

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass the allow/deny lists via DNS Rebinding (Time-of-Check Time-of-Use) or by exploiting the default configuration which fails to enforce any deny list. This vulnerability is fixed in 3.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*

History

24 Apr 2026, 16:37

Type Values Removed Values Added
First Time Flowiseai
Flowiseai flowise
References () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-2x8m-83vc-6wv4 - () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-2x8m-83vc-6wv4 - Exploit, Vendor Advisory
CPE cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*

23 Apr 2026, 21:16

Type Values Removed Values Added
References () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-2x8m-83vc-6wv4 - () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-2x8m-83vc-6wv4 -

23 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 20:16

Updated : 2026-04-24 16:37


NVD link : CVE-2026-41272

Mitre link : CVE-2026-41272

CVE.ORG link : CVE-2026-41272


JSON object : View

Products Affected

flowiseai

  • flowise
CWE
CWE-918

Server-Side Request Forgery (SSRF)