CVE-2025-26319
JavaScript vulnerability analysis and mitigation

Overview

FlowiseAI Flowise v2.2.6 contains an arbitrary file upload vulnerability in the /api/v1/attachments endpoint. The vulnerability was discovered in March 2025 and affects the Flowise open-source platform, which is widely used for building AI agents with over 35,000 GitHub stars and more than a million Docker pulls (Security Online).

Technical details

The vulnerability exists in the knowledge upload feature's /api/v1/attachments route, which handles attachment uploads. The API endpoint lacks proper validation of user-supplied parameters, allowing attackers to manipulate these parameters and bypass security checks. The vulnerability has been assigned a critical CVSS v3.1 score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high severity across confidentiality, integrity, and availability impacts (NVD).

Impact

The vulnerability allows attackers to upload malicious files, including scripts, configuration files, and SSH keys, potentially leading to remote code execution and complete server compromise. Attackers can perform path traversal and overwrite critical files on the server, enabling them to modify API keys, execute arbitrary code, and gain unauthorized access to sensitive data (Security Online).

Mitigation and workarounds

As no official patch has been released by the Flowise team, users are advised to either apply the community-provided patch or change their storage type to S3 to mitigate the risk (Security Online).

Community reactions

The vulnerability has raised significant concern due to Flowise's widespread adoption across small and medium-sized businesses (SMBs) and large enterprises. The security community has noted the critical nature of the vulnerability, particularly given the platform's popularity with over 35,000 GitHub stars and more than a million Docker pulls (Security Online).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66456CRITICAL9.1
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-66457HIGH7.5
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-65849MEDIUM6.9
  • JavaScriptJavaScript
  • altcha
NoNoDec 08, 2025
CVE-2025-66202MEDIUM6.5
  • JavaScriptJavaScript
  • astro
NoYesDec 09, 2025
CVE-2025-14284MEDIUM5.1
  • JavaScriptJavaScript
  • @tiptap/extension-link
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management