Описание
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, Flowise trusts any HTTP client that sets the header x-request-from: internal, allowing an authenticated tenant session to bypass all /api/v1/** authorization checks. With only a browser cookie, a low-privilege tenant can invoke internal administration endpoints (API key management, credential stores, custom function execution, etc.), effectively escalating privilege. This issue has been patched in version 3.0.13.
Ссылки
- ProductRelease Notes
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.0.13 (исключая)
cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
EPSS
Процентиль: 25%
0.00085
Низкий
8.8 High
CVSS3
Дефекты
CWE-863
Связанные уязвимости
github
около 1 месяца назад
Flowise has Authorization Bypass via Spoofed x-request-from Header
EPSS
Процентиль: 25%
0.00085
Низкий
8.8 High
CVSS3
Дефекты
CWE-863