The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
History

Mon, 18 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
CWE-862
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 16 Aug 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Flowiseai
Flowiseai flowise
Vendors & Products Flowiseai
Flowiseai flowise

Thu, 14 Aug 2025 10:00:00 +0000

Type Values Removed Values Added
Description The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
Title Unsupervised OS command execution leads to remote code execution by unauthenticated network attackers
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published: 2025-08-14T09:54:22.531Z

Updated: 2025-08-18T16:47:58.906Z

Reserved: 2025-08-13T13:30:26.091Z

Link: CVE-2025-8943

cve-icon Vulnrichment

Updated: 2025-08-18T16:47:51.846Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-14T10:15:29.637

Modified: 2025-08-18T17:15:31.690

Link: CVE-2025-8943

cve-icon Redhat

No data.