Vulnerability DatabaseGHSA-8vvx-qvq9-5948

GHSA-8vvx-qvq9-5948
JavaScript vulnerability analysis and mitigation

Overview

A critical security vulnerability was discovered in Flowise affecting versions up to 2.2.7, identified as GHSA-8vvx-qvq9-5948. The vulnerability allows attackers to write files with arbitrary content to the filesystem via the /api/v1/document-store/loader/process API endpoint, potentially leading to Remote Code Execution (RCE). The issue was published and reviewed on March 14, 2025, with a CVSS score of 10.0 (Critical) (GitHub Advisory).

Technical details

The vulnerability exists in multiple file writing functions within packages/components/src/storageUtils.ts, specifically in addBase64FilesToStorage, addArrayFilesToStorage, and addSingleFileToStorage. The core issue stems from the fileName parameter, an untrusted external input, being used directly in path.join() without proper verification. This allows attackers to traverse directories using '../' and write files to arbitrary paths. The vulnerability received a CVSS:3.1 score of 10.0 with vector string AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, indicating network attack vector, low complexity, no privileges required, and no user interaction needed (GitHub Advisory).

Impact

The vulnerability enables Remote Code Execution (RCE) through arbitrary file writing capabilities. Attackers can obtain full server shell privileges by opening a reverse shell. In the proof of concept, attackers could overwrite package.json to execute arbitrary commands when the server starts, demonstrating the severity of the impact (GitHub Advisory).

Mitigation and workarounds

A fix has been implemented that includes path traversal detection and UUID validation for chatflowId and chatId parameters. The patch adds input validation through the isPathTraversal and isValidUUID functions to prevent directory traversal attacks (Flowise Commit).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management