Логотип exploitDog
bind:CVE-2025-59528
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59528

Количество 3

Количество 3

redhat логотип

CVE-2025-59528

3 месяца назад

No description is available for this CVE.

EPSS: Высокий
nvd логотип

CVE-2025-59528

3 месяца назад

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.

CVSS3: 10
EPSS: Высокий
github логотип

GHSA-3gcm-f6qx-ff7p

3 месяца назад

Flowise has Remote Code Execution vulnerability

CVSS3: 10
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-59528

No description is available for this CVE.

79%
Высокий
3 месяца назад
nvd логотип
CVE-2025-59528

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.

CVSS3: 10
79%
Высокий
3 месяца назад
github логотип
GHSA-3gcm-f6qx-ff7p

Flowise has Remote Code Execution vulnerability

CVSS3: 10
79%
Высокий
3 месяца назад

Уязвимостей на страницу