Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7944-7c6r-55vv | FlowiseAI Pre-Auth Arbitrary Code Execution |
Thu, 23 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:flowiseai:flowise:3.0.5:*:*:*:*:*:*:* |
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| Vendors & Products |
Flowiseai
Flowiseai flowise |
Fri, 17 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Fri, 17 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowise through v3.0.4 is vulnerable to remote code execution via unsanitized evaluation of user input in the "Supabase RPC Filter" field. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-17T19:31:49.597Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57164
Updated: 2025-10-17T19:31:44.602Z
Status : Analyzed
Published: 2025-10-17T18:15:37.013
Modified: 2025-10-23T12:33:49.467
Link: CVE-2025-57164
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:24:45Z
Github GHSA