Cyber Posture

CVE-2026-41268

CriticalPublic PoC

Published: 23 April 2026

Published
23 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0068 71.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass…

more

using the FILE-STORAGE:: keyword combined with a NODE_OPTIONS environment variable injection. This allows for the execution of arbitrary system commands with root privileges within the containerized Flowise instance, requiring only a single HTTP request and no authentication or knowledge of the instance. This vulnerability is fixed in 3.1.0.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of the critical RCE flaw through patching to Flowise version 3.1.0 as specified in the advisory.

prevent

Mandates validation of information inputs to counter the improper input validation enabling the FILE-STORAGE:: parameter override and NODE_OPTIONS environment variable injection.

prevent

Enforces boundary protection to monitor and control unauthenticated HTTP requests, blocking exploitation attempts at external interfaces.

Security SummaryAI

CVE-2026-41268 is a critical unauthenticated remote command execution (RCE) vulnerability affecting Flowise, an open-source drag-and-drop user interface for building customized large language model (LLM) flows. Versions of Flowise prior to 3.1.0 are vulnerable due to a parameter override bypass that leverages the FILE-STORAGE:: keyword in combination with NODE_OPTIONS environment variable injection. This flaw, associated with CWE-20 (Improper Input Validation), carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on April 23, 2026.

Any unauthenticated attacker with network access to a vulnerable Flowise instance can exploit this vulnerability using a single HTTP request, without requiring authentication credentials or prior knowledge of the target. Successful exploitation enables the execution of arbitrary system commands with root privileges inside the containerized Flowise environment, potentially leading to full compromise of the host system.

The official GitHub security advisory (GHSA-cvrr-qhgw-2mm6) confirms that the vulnerability is fully remediated in Flowise version 3.1.0, urging users to upgrade immediately. No additional workarounds are specified, emphasizing the need for prompt patching in all exposed deployments.

Flowise's role in LLM workflow orchestration makes this vulnerability particularly relevant for AI/ML practitioners, as compromised instances could disrupt or manipulate model training and inference pipelines. No public evidence of real-world exploitation has been reported as of publication.

Details

CWE(s)

Affected Products

flowiseai
flowise
≤ 3.1.0

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: large language model

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated RCE vulnerability in public-facing Flowise web application (T1190) enables execution of arbitrary system commands with root privileges in containerized Unix environment (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References