Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user (e.g., public Wi-Fi) can intercept the reset link and gain unauthorized access to the victim’s account. This vulnerability is fixed in 3.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-x5w6-38gp-mrqh | Exploit Mitigation Vendor Advisory |
| https://hackerone.com/reports/1888915 | Exploit Third Party Advisory |
| https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-x5w6-38gp-mrqh | Exploit Mitigation Vendor Advisory |
Configurations
History
25 Apr 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-x5w6-38gp-mrqh - Exploit, Mitigation, Vendor Advisory |
24 Apr 2026, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-x5w6-38gp-mrqh - Exploit, Mitigation, Vendor Advisory | |
| References | () https://hackerone.com/reports/1888915 - Exploit, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Flowiseai
Flowiseai flowise |
|
| CPE | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* |
23 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 20:16
Updated : 2026-04-25 02:16
NVD link : CVE-2026-41275
Mitre link : CVE-2026-41275
CVE.ORG link : CVE-2026-41275
JSON object : View
Products Affected
flowiseai
- flowise
CWE
CWE-319
Cleartext Transmission of Sensitive Information
