CVE-2025-58434
Flowise 脆弱性の分析と軽減

概要

CVE-2025-58434 affects Flowise, a drag & drop user interface for building customized large language model flows. The vulnerability was discovered in version 3.0.5 and earlier, where the forgot-password endpoint returns sensitive information including valid password reset tokens without authentication or verification. This critical vulnerability was disclosed on September 12, 2025, affecting both cloud service (cloud.flowiseai.com) and self-hosted/local Flowise deployments (GitHub Advisory).

技術的な詳細

The vulnerability exists in the /api/v1/account/forgot-password endpoint which accepts an email address as input. Instead of only sending a reset email, the API responds with sensitive user details including User ID, name, email, hashed credential, status, timestamps, and most critically, a valid tempToken and its expiry intended for password reset. The vulnerability has been assigned a CVSS v3.1 Base Score of 9.8 (Critical) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating remote exploitability with no required privileges or user interaction (GitHub Advisory).

影響

The vulnerability enables any unauthenticated attacker to generate a reset token for arbitrary users and directly reset their passwords, leading to complete account takeover (ATO). Since the vulnerability affects both cloud and self-hosted deployments, any exposed instance is vulnerable. Attackers can compromise any account, including administrator or high-value accounts, with only knowledge of the target's email address. This can result in full account takeover, data exposure, impersonation, and possible control over organizational assets (GitHub Advisory).

軽減策と回避策

A fix has been implemented in commit 9e178d68873eb876073846433a596590d3d9c863. Recommended remediation steps include: not returning reset tokens or sensitive account details in API responses, delivering tokens only via registered email channel, ensuring forgot-password responds with generic success messages, requiring strong validation of the tempToken, applying fixes to both cloud and self-hosted deployments, logging and monitoring password reset requests, and considering multi-factor verification for sensitive accounts (GitHub Advisory, GitHub Commit).

関連情報


ソースこのレポートは AI を使用して生成されました

関連 Flowise 脆弱 性:

CVE 識別子

重大度

スコア

テクノロジー

コンポーネント名

CISA KEV エクスプロイト

修正あり

公開日

GHSA-8vvx-qvq9-5948CRITICAL10
  • JavaScriptJavaScript
  • flowise
いいえいいえMar 14, 2025
CVE-2025-58434CRITICAL9.8
  • FlowiseFlowise
  • flowise
いいえいいえSep 12, 2025
CVE-2025-8943CRITICAL9.8
  • FlowiseFlowise
  • flowise
いいえいいえAug 14, 2025
CVE-2025-55346CRITICAL9.8
  • FlowiseFlowise
  • flowise
いいえいいえAug 14, 2025
GHSA-9c4c-g95m-c8cpMEDIUM5.9
  • JavaScriptJavaScript
  • flowise
いいえいいえApr 07, 2025

無料の脆弱性評価

クラウドセキュリティポスチャーのベンチマーク

9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。

評価を依頼する

パーソナライズされたデモを見る

実際に Wiz を見てみませんか?​

"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
デビッド・エストリックCISO (最高情報責任者)
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
アダム・フレッチャーチーフ・セキュリティ・オフィサー
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"
グレッグ・ポニャトフスキ脅威および脆弱性管理責任者