CVE-2024-9148
JavaScript vulnerability analysis and mitigation

Overview

Flowise versions prior to 2.1.1 and Flowise Chat Embed versions prior to 2.0.0 are affected by a Stored Cross-Site Scripting vulnerability. The vulnerability stems from inadequate input sanitization in the Flowise Chat Embed component. This security issue was discovered in June 2024 and publicly disclosed on September 24, 2024 (Tenable Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 9.6 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H. The issue arises from insufficient sanitization of user inputs in the chat functionality, allowing malicious JavaScript injection. While certain HTML attributes like on* events are filtered, attackers can still successfully execute XSS payloads without event handlers (Tenable Advisory).

Impact

As the chatbot is designed to be embedded on websites, successful exploitation allows attackers to execute malicious JavaScript code in the context of the Flowise administration panel. This can lead to the theft of sensitive information, session hijacking, and potential compromise of the administrative interface when users interact with the infected chatbot (Tenable Advisory).

Mitigation and workarounds

Users are advised to upgrade to Flowise version 2.1.1 or later. For those using only the Flowise Chat Embed library, upgrading to version 2.0.0 or later is recommended (Tenable Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management