Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cvrr-qhgw-2mm6 | Flowise: Parameter Override Bypass Remote Command Execution |
Fri, 24 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Flowiseai
Flowiseai flowise |
|
| Metrics |
cvssV3_1
|
Thu, 23 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined with a NODE_OPTIONS environment variable injection. This allows for the execution of arbitrary system commands with root privileges within the containerized Flowise instance, requiring only a single HTTP request and no authentication or knowledge of the instance. This vulnerability is fixed in 3.1.0. | |
| Title | Flowise: Flowise Parameter Override Bypass Remote Command Execution | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T20:19:47.223Z
Reserved: 2026-04-18T14:01:46.801Z
Link: CVE-2026-41268
Updated: 2026-04-23T20:19:43.784Z
Status : Analyzed
Published: 2026-04-23T20:16:15.300
Modified: 2026-04-24T15:14:39.110
Link: CVE-2026-41268
No data.
OpenCVE Enrichment
Updated: 2026-04-28T07:30:26Z
Github GHSA