2 Sources
2 Sources
[1]
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution. "The CustomMCP node allows users to input configuration settings for connecting to an external MCP (Model Context Protocol) server," Flowise said in an advisory released in September 2025. "This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation." Flowise noted that successful exploitation of the vulnerability can allow access to dangerous modules such as child_process (command execution) and fs (file system), as it runs with full Node.js runtime privileges. Put differently, a threat actor who weaponizes the flaw can execute arbitrary JavaScript code on the Flowise server, leading to full system compromise, file system access, command execution, and sensitive data exfiltration. "As only an API token is required, this poses an extreme security risk to business continuity and customer data," Flowise added. It credited Kim SooHyun with discovering and reporting the flaw. The issue was addressed in version 3.0.6 of the npm package. According to details shared by VulnCheck, exploitation activity against the vulnerability has originated from a single Starlink IP address. CVE-2025-59528 is the third Flowise flaw with in-the-wild exploitation after CVE-2025-8943 (CVSS score: 9.8), an operating system command remote code execution, and CVE-2025-26319 (CVSS score: 8.9), an arbitrary file upload. "This is a critical-severity bug in a popular AI platform used by a number of large corporations," Caitlin Condon, vice president of security research at VulnCheck, told The Hacker News in a statement. "This specific vulnerability has been public for more than six months, which means defenders have had time to prioritize and patch the vulnerability. The internet-facing attack surface area of 12,000+ exposed instances makes the active scanning and exploitation attempts we're seeing more serious, as it means attackers have plenty of targets to opportunistically reconnoiter and exploit."
[2]
Max severity Flowise RCE vulnerability now exploited in attacks
Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for building custom LLM apps and agentic systems to execute arbitrary code. The flaw allows injecting JavaScript code without any security checks and was publicly disclosed last September, with the warning that successful exploitation leads to command execution and file system access. The problem is with the Flowise CustomMCP node allowing configuration settings to connect to an external Model Context Protocol (MCP) server and unsafely evaluating the mcpServerConfig input from the user. During this process, it can execute JavaScript without first validating its safety. The developer addressed the issue in Flowise version 3.0.6. The latest current version is 3.1.1, released two weeks ago. Flowise is an open-source, low-code platform for building AI agents and LLM-based workflows. It provides a drag-and-drop interface that lets users connect components into pipelines powering chatbots, automation, and AI systems. It is used by a broad range of users, including developers working in AI prototyping, non-technical users working with no-code toolsets, and companies that operate customer support chatbots and knowledge-based assistants. Caitlin Condon, security researcher at vulnerability intelligence company VulnCheck, announced on LinkedIn that exploitation of CVE-2025-59528 has been detected by their Canary network. "Early this morning, VulnCheck's Canary network began detecting first-time exploitation of CVE-2025-59528, a CVSS-10 arbitrary JavaScript code injection vulnerability in Flowise, an open-source AI development platform," Condon warned. Although the activity appears limited at this time, originating from a single Starlink IP, the researchers warned that there are between 12,000 and 15,000 Flowise instances exposed online right now. However, it is unclear what percentage of those are vulnerable Flowise servers. Condon notes that the observed activity related to CVE-2025-59528 occurs in addition to CVE-2025-8943 and CVE-2025-26319, which also impact Flowise and for which active exploitation in the wild has been observed. Currently, VulnCheck provides exploit samples, network signatures, and YARA rules only to its customers. Users of Flowise are recommended to upgrade to version 3.1.1 or at least 3.0.6 as soon as possible. They should also consider removing their instances from the public internet if external access is not needed.
Share
Share
Copy Link
Threat actors are exploiting a maximum-severity code injection flaw in Flowise, an open-source AI platform for building custom LLM applications. The vulnerability, CVE-2025-59528, allows attackers to execute arbitrary JavaScript code and achieve full system compromise. VulnCheck detected active exploitation attempts targeting over 12,000 exposed Flowise instances globally.
Threat actors have begun exploiting CVE-2025-59528, a code injection flaw in Flowise that carries a CVSS 10.0 rating, marking it as a maximum-severity vulnerability
1
. The open-source AI platform, widely used for building custom LLM applications and AI agent systems, now faces active exploitation that could lead to remote code execution across thousands of installations. VulnCheck's Canary network first detected exploitation attempts early in the morning, with activity originating from a single Starlink IP address2
.
Source: BleepingComputer
Flowise provides a drag-and-drop interface that enables developers and non-technical users to create AI-powered chatbots, automation workflows, and knowledge-based assistants. The platform's accessibility has made it popular among corporations and individual developers working in AI prototyping
2
. However, this widespread adoption now creates significant security risk as attackers scan for vulnerable targets.
Source: Hacker News
The vulnerability resides in Flowise's CustomMCP node, which allows users to input configuration settings for connecting to an external Model Context Protocol server
1
. According to Flowise's advisory released in September 2025, the node parses the user-provided mcpServerConfig string to build the MCP server configuration but executes JavaScript code without any security validation during this process.This design flaw grants attackers access to dangerous modules such as child_process for command execution and fs for file system operations, as the code runs with full Node.js runtime privileges
1
. A threat actor who weaponizes this vulnerability can execute arbitrary JavaScript code on the Flowise server, leading to full system compromise, file system access, command execution, and sensitive data exfiltration. As Flowise noted in its advisory, "As only an API token is required, this poses an extreme security risk to business continuity and customer data"1
.Between 12,000 and 15,000 exposed Flowise instances are currently accessible online, creating a substantial attack surface for opportunistic threat actors
2
. While the exact percentage of vulnerable servers remains unclear, the sheer volume of exposed instances amplifies the threat. Caitlin Condon, vice president of security research at VulnCheck, emphasized the severity: "This is a critical-severity bug in a popular AI platform used by a number of large corporations"1
.The vulnerability has been public for more than six months, giving defenders time to prioritize and patch the flaw, yet active exploitation continues
1
. This represents the third Flowise flaw experiencing in-the-wild exploitation, following CVE-2025-8943, an operating system command remote code execution with a CVSS score of 9.8, and CVE-2025-26319, an arbitrary file upload vulnerability with a CVSS score of 8.91
2
.Related Stories
The issue was addressed in Flowise version 3.0.6 of the npm package, with the latest version 3.1.1 released two weeks ago
1
2
. Kim SooHyun discovered and reported the flaw to Flowise . Users should upgrade to version 3.1.1 or at minimum 3.0.6 immediately to protect against active exploitation. Organizations should also consider removing their instances from the public internet if external access is not essential for operations2
. VulnCheck currently provides exploit samples, network signatures, and YARA rules to its customers to help detect and prevent attacks2
.Summarized by
Navi
[1]
[2]
11 Jul 2025•Technology

Yesterday•Technology

20 Jan 2026•Technology

1
Policy and Regulation

2
Technology

3
Policy and Regulation
