CVE-2026-41138
Published: 23 April 2026
Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input…
more
is directly applied to the question parameter within the prompt template and it is reflected to the Python code without any sanitization. This vulnerability is fixed in 3.1.0.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the lack of input verification by requiring validation mechanisms at input points to block malicious code injection into the prompt template executed via Pandas.
Mandates timely identification, reporting, and correction of flaws like this RCE vulnerability fixed in Flowise version 3.1.0.
Limits the potential impact of successful RCE by enforcing least privilege on processes handling user inputs in Flowise.
Security SummaryAI
CVE-2026-41138 is a remote code execution vulnerability in Flowise, an open-source drag-and-drop user interface for building customized large language model (LLM) flows. The issue affects versions prior to 3.1.0 and resides in the AirtableAgent.ts component, where a lack of input verification allows malicious user input supplied to the "question" parameter in a prompt template to be directly reflected into executed Python code via Pandas without sanitization. This CWE-94 (code injection) flaw carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for arbitrary code execution.
An attacker with low-privilege access (PR:L), such as an authenticated user, can exploit this over the network with low complexity and no user interaction required. By crafting malicious input that injects Python code through the unsanitized prompt parameter, the attacker achieves remote code execution on the server, potentially compromising confidentiality, integrity, and availability with high impact—enabling full system takeover, data exfiltration, or further lateral movement.
The vulnerability is addressed in Flowise version 3.1.0, as detailed in the official security advisory at https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-f228-chmx-v6j6. Security practitioners should prioritize upgrading to 3.1.0 or later and review access controls for AirtableAgent usage.
Flowise's role in LLM orchestration makes this vulnerability particularly relevant for AI/ML deployments, where untrusted inputs could propagate through agentic workflows. No public evidence of real-world exploitation has been reported as of the CVE publication on 2026-04-23.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Data Processing Libraries
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: large language model
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables RCE via template injection (T1221) in prompt template reflected to Python code (T1059.006) in public-facing web app (T1190).