
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
CVE-2025-55346 is a critical vulnerability discovered in the Flowise AI Platform, an open-source generative AI development platform used to build AI agents and LLM workflows. The vulnerability was disclosed on August 14, 2025, and received a CVSS v3.1 score of 9.8 (Critical). The flaw affects the platform's implementation of a dynamic Function constructor, which processes user-controlled input (JFrog Research, SecurityOnline).
The vulnerability stems from unsafe implementation of a dynamic Function constructor that processes user-controlled input. The flaw allows attackers to inject and execute arbitrary JavaScript code in the context of the host without proper sandboxing. The vulnerability has been assigned a CVSS v3.1 Base Score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and no required privileges or user interaction (JFrog Research).
The vulnerability enables attackers to execute arbitrary unsandboxed JavaScript code in the context of the host system. This can lead to full system compromise, allowing attackers to install malware, exfiltrate data, or pivot deeper into network infrastructure. The impact is particularly severe as the vulnerability can be exploited with minimal to no authentication barriers (SecurityOnline).
Administrators are advised to update Flowise to the latest patched version immediately, enable authentication, and implement role-based access controls (RBAC) to restrict access. Additional security measures include isolating Flowise instances from untrusted networks and monitoring for suspicious API calls, particularly to the node-load-method/customMCP endpoint (SecurityOnline).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"