Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24801 | Flowise OS command remote code execution |
Github GHSA |
GHSA-2vv2-3x8x-4gv7 | Flowise OS command remote code execution |
Tue, 23 Sep 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* |
Mon, 18 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-306 CWE-862 |
|
| Metrics |
ssvc
|
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| Vendors & Products |
Flowiseai
Flowiseai flowise |
Thu, 14 Aug 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands. | |
| Title | Unsupervised OS command execution leads to remote code execution by unauthenticated network attackers | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-08-18T16:47:58.906Z
Reserved: 2025-08-13T13:30:26.091Z
Link: CVE-2025-8943
Updated: 2025-08-18T16:47:51.846Z
Status : Analyzed
Published: 2025-08-14T10:15:29.637
Modified: 2025-09-23T15:23:05.797
Link: CVE-2025-8943
No data.
OpenCVE Enrichment
Updated: 2025-08-16T21:41:32Z
EUVD
Github GHSA