Cyber Posture

CVE-2025-61687

HighPublic PoC

Published: 06 October 2025

Published
06 October 2025
Modified
16 October 2025
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
EPSS Score 0.0027 50.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2025-61687 is a file upload vulnerability in version 3.0.7 of FlowiseAI, an open-source drag-and-drop user interface for building customized large language model (LLM) flows. The issue stems from inadequate validation during file uploads, as the system fails to check file extensions, MIME types, or file content. This allows authenticated users to upload arbitrary files, including malicious Node.js web shells, which are persistently stored on the server. The vulnerability is rated high severity with a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type).

Authenticated attackers with low privileges can exploit this vulnerability remotely and with low complexity to upload Node.js-based web shells via the affected upload endpoints. These shells persist on the server and expose HTTP endpoints capable of executing arbitrary commands if triggered, such as through administrator error or chained vulnerabilities. While the uploaded files do not auto-execute, successful triggering leads to remote code execution (RCE), resulting in high impacts to integrity and availability, with low confidentiality impact.

No patched versions of FlowiseAI were available as of the CVE's publication on 2025-10-06T16:15:35.223. The vulnerable code is exposed in the FlowiseAI GitHub repository, specifically in packages/components/src/storageUtils.ts (lines 1104-1111, 170-175, and 533-541) and packages/server/src/controllers/attachments/index.ts (lines 4-11) and packages/server/src/routes/attachments/index.ts (line 8). Practitioners should audit these locations, restrict upload permissions, and implement comprehensive file validation until official fixes are released.

Details

CWE(s)
CWE-434

Affected Products

flowiseai
flowise
3.0.7

AI Security Analysis

AI Category
AI Agent Protocols and Integrations
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Flowise is a drag & drop user interface platform for building customized large language model (LLM) flows, fitting as an AI platform for LLM orchestration and deployment.

MITRE ATT&CK Enterprise Techniques

T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Arbitrary file upload without validation enables ingress of Node.js web shells (T1105, T1100) for persistent remote access and JavaScript-based RCE (T1059.007).

References