{"id":515,"date":"2026-04-07T06:16:36","date_gmt":"2026-04-07T06:16:36","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=515"},"modified":"2026-04-07T06:16:36","modified_gmt":"2026-04-07T06:16:36","slug":"flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=515","title":{"rendered":"Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 07, 2026<\/span><\/span><span class=\"p-tags\">Artificial Intelligence \/ Vulnerability<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCGR6ZfT0_UppVPQsgk7lwTbzfybdDFY-HeJi9F6VE6HuN7-Ja-lpveDnPA-kcS7x8l1oZ0lUqPoEFdRTOMt0Z8H6EeT_NadV_P7bjlh8Je6Q-T5KAlOCzOWt-LyY3jY8RsTlRTUzuXsVwf_gs-_KyXw8G_LcFz2dY-2P9XozQWy2p9PneNGUMctvpIZYM\/s1700-e365\/flowise.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Threat actors are exploiting a maximum-severity security flaw in <b>Flowise<\/b>, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck.<\/p>\n<p>The vulnerability in question\u00a0is <strong>CVE-2025-59528<\/strong> (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution.<\/p>\n<p>\u00abThe CustomMCP node allows users to input configuration settings for connecting to an external MCP (Model Context Protocol) server,\u00bb\u00a0Flowise <a href=\"https:\/\/github.com\/FlowiseAI\/Flowise\/security\/advisories\/GHSA-3gcm-f6qx-ff7p\">said<\/a> in an advisory released in September 2025. \u00abThis node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation.\u00bb<\/p>\n<p>Flowise noted that successful exploitation of the vulnerability can allow access to dangerous modules such as child_process (command execution) and fs (file system), as it runs with full Node.js\u00a0runtime privileges.<\/p>\n<p>Put differently, a threat actor\u00a0who weaponizes the flaw can execute arbitrary JavaScript code on the Flowise server, leading to full system compromise, file system access, command execution, and sensitive\u00a0data exfiltration.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abAs only an API token is required, this poses an extreme security risk to business continuity and customer data,\u00bb Flowise added. It\u00a0credited Kim SooHyun with discovering and reporting the\u00a0flaw. The issue was\u00a0addressed in version 3.0.6\u00a0of the npm\u00a0package.<\/p>\n<p>According to details shared by VulnCheck, exploitation activity against the vulnerability has originated from a single Starlink IP address. CVE-2025-59528 is\u00a0the <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7446686314562850817\/\">third Flowise\u00a0flaw<\/a> with in-the-wild exploitation\u00a0after <a href=\"https:\/\/github.com\/advisories\/GHSA-2vv2-3x8x-4gv7\">CVE-2025-8943<\/a> (CVSS score: 9.8), an operating system command remote code execution,\u00a0and <a href=\"https:\/\/github.com\/advisories\/GHSA-69jq-qr7w-j7qh\">CVE-2025-26319<\/a> (CVSS score: 8.9), an arbitrary file\u00a0upload.<\/p>\n<p>\u00abThis is a critical-severity bug in a popular AI platform used\u00a0by a number\u00a0of large corporations,\u00bb Caitlin Condon, vice president of security research at VulnCheck, told The Hacker News in a statement.<\/p>\n<p>\u00abThis specific vulnerability has been public for more than six months, which means defenders have had time to prioritize and patch the vulnerability. The\u00a0internet-facing attack surface area of 12,000+ exposed instances makes the active scanning and exploitation attempts we&#8217;re seeing more serious, as it means attackers have plenty of\u00a0targets to opportunistically reconnoiter and\u00a0exploit.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 07, 2026Artificial Intelligence \/ Vulnerability Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The&hellip;<\/p>\n","protected":false},"author":1,"featured_media":516,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[64,683,1096,497,65,137,1095,301,316],"class_list":["post-515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-active","tag-agent","tag-builder","tag-cvss","tag-exploitation","tag-exposed","tag-flowise","tag-instances","tag-rce"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=515"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/515\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/516"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}