Vulnerability DatabaseGHSA-9c4c-g95m-c8cp

GHSA-9c4c-g95m-c8cp
JavaScript vulnerability analysis and mitigation

Overview

A SQL injection vulnerability (GHSA-9c4c-g95m-c8cp) was discovered in Flowise versions <= 2.2.7, affecting the import functions (importChatflows, importTools, importVariables). The vulnerability was published on April 7, 2025, and allows authenticated users to perform SQL injection attacks through insufficient validation of chatflow.id in the importChatflows API (GitHub Advisory).

Technical details

The vulnerability stems from unsafe SQL query construction in the importChatflows API. When processing imported chatflows, the API directly incorporates user-supplied chatflow IDs into SQL queries without proper sanitization. The vulnerability manifests in two ways: through path traversal by adding '../' to chatflow.id, and through SQL injection when malicious SQL queries are passed to newChatflow.id. The CVSS score is 5.9 (Moderate), with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L (GitHub Advisory).

Impact

The vulnerability can lead to database leaks and lateral movement within the system. Attackers can potentially access sensitive information from the Flowise database, including credential tables. A successful exploitation demonstrated the ability to extract encrypted data and credential names from the database (GitHub Advisory).

Mitigation and workarounds

It is recommended to limit all chatflow IDs and chat IDs to UUID format to prevent SQL injection attacks. As of the advisory publication, there is no patched version available (GitHub Advisory).

Community reactions

The vulnerability was addressed through a pull request (#4226) which was merged into the main branch of Flowise. The fix involves validating IDs for all imports to prevent SQL injection attacks (GitHub PR).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22787HIGH8.7
  • JavaScriptJavaScript
  • html2pdf.js
NoYesJan 14, 2026
CVE-2026-22820MEDIUM6.3
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22819MEDIUM5.9
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026
GHSA-73rr-hh4g-fpgxLOWN/A
  • JavaScriptJavaScript
  • diff
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management