xiand.ai
Apr 8, 2026 · Updated 08:35 PM UTC
Cybersecurity

Hackers Exploiting Critical Vulnerability in Flowise to Execute Arbitrary Code

A critical remote code execution (RCE) vulnerability (CVE-2025-59528) in the open-source AI development platform Flowise is being actively exploited, potentially granting attackers full system access.

Ryan Torres

2 min read

Hackers Exploiting Critical Vulnerability in Flowise to Execute Arbitrary Code
AI software development concept

The open-source AI application development platform Flowise has been hit by a severe remote code execution (RCE) vulnerability, tracked as CVE-2025-59528. Security researchers have confirmed that the flaw is already being actively exploited in the wild.

Vulnerability Overview and Threat Analysis

The vulnerability resides within Flowise’s CustomMCP node. Because the system fails to properly sanitize user-configured 'mcpServerConfig' inputs, attackers can inject and execute malicious JavaScript code. Disclosed last September, the vulnerability carries a maximum CVSS score of 10.0, meaning that a successful exploit allows attackers to execute arbitrary commands and gain direct access to the underlying file system.

Caitlin Condon, a researcher at vulnerability intelligence firm VulnCheck, issued a warning on LinkedIn. She noted that VulnCheck’s canary network detected the first exploitation attempts targeting this flaw. While the current activity appears limited and originates from a single Starlink IP address, the risk remains significant.

Flowise is a low-code platform primarily used for building AI agents and workflows powered by large language models. Thanks to its drag-and-drop interface, it is widely used for developing AI prototypes, chatbots, and automation systems. Estimates suggest that between 12,000 and 15,000 Flowise instances are currently exposed to the public internet. While the exact number of vulnerable servers is unclear, the potential attack surface is massive.

Condon pointed out that in addition to CVE-2025-59528, Flowise has previously been affected by other vulnerabilities, such as CVE-2025-8943 and CVE-2025-26319, both of which also have records of exploitation in the wild.

Flowise developers addressed this security flaw in version 3.0.6. Officials strongly advise all users to upgrade to the latest version, 3.1.1, immediately. For organizations that do not require external access, experts recommend taking these instances offline to completely eliminate the potential attack vector.

Comments

Comments are stored locally in your browser.