Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-30821

Опубликовано: 07 мар. 2026
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS, allowing unauthenticated access to the file upload API. While the server validates uploads based on the MIME types defined in chatbotConfig.fullFileUpload.allowedUploadFileTypes, it implicitly trusts the client-provided Content-Type header (file.mimetype) without verifying the file's actual content (magic bytes) or extension (file.originalname). Consequently, an attacker can bypass this restriction by spoofing the Content-Type as a permitted type (e.g., application/pdf) while uploading malicious scripts or arbitrary files. Once uploaded via addArrayFilesToStorage, these files persist in backend storage (S3, GCS, or local disk). This vulnerability serves as a critical entry point that, when chained with other features like static hosting or file retrieval, can lead to Stored XSS, malicious file

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*
Версия до 3.0.13 (исключая)

EPSS

Процентиль: 34%
0.0014
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-434

Связанные уязвимости

github
около 1 месяца назад

Flowise has Arbitrary File Upload via MIME Spoofing

EPSS

Процентиль: 34%
0.0014
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-434