Cyber Posture

CVE-2026-2097

High

Published: 10 February 2026

Published
10 February 2026
Modified
13 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0033 55.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents arbitrary file uploads by requiring validation of file types, extensions, and content to block dangerous web shells.

prevent

SI-2 mandates timely remediation of the specific flaw in Agentflow enabling unrestricted file uploads through patching or updates.

preventdetect

SI-3 mitigates web shell execution by scanning uploaded files for malicious code at system entry points.

Security SummaryAI

CVE-2026-2097 is an Arbitrary File Upload vulnerability in Agentflow, a product developed by Flowring. Published on 2026-02-10, it enables authenticated remote attackers to upload web shell backdoors and execute arbitrary code on the affected server. The vulnerability is rated 8.8 on the CVSS 3.1 scale (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type).

Attackers with low-privilege authenticated access can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows them to upload malicious files that function as web shells, granting high-impact arbitrary code execution on the server, potentially compromising confidentiality, integrity, and availability.

Mitigation details are provided in advisories from the Taiwan CERT, available at https://www.twcert.org.tw/en/cp-139-10700-3534d-2.html and https://www.twcert.org.tw/tw/cp-132-10699-49c0b-1.html.

Details

CWE(s)

Affected Products

flowring
agentflow
all versions

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

The vulnerability allows authenticated attackers to upload web shells for arbitrary code execution, directly facilitating T1190 (Exploit Public-Facing Application) via the file upload flaw in a network-accessible product and T1100 (Web Shell) as explicitly described.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References