Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8f47-4rh3-x44m | Flowise: Bcrypt Password Hash Exposure |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-312 |
Wed, 06 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in FlowiseAI Flowise up to 3.0.12. Affected is the function Login of the file packages/server/src/enterprise/services/account.service.ts of the component API Response Handler. The manipulation results in information disclosure. The attack can be launched remotely. A high complexity level is associated with this attack. The exploitability is told to be difficult. You should upgrade the affected component. | |
| Title | FlowiseAI Flowise API Response account.service.ts login information disclosure | |
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| Weaknesses | CWE-200 CWE-284 |
|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Flowiseai
Flowiseai flowise |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-06T13:03:55.441Z
Reserved: 2026-05-06T07:40:30.890Z
Link: CVE-2026-8026
Updated: 2026-05-06T13:03:51.605Z
Status : Analyzed
Published: 2026-05-06T13:16:10.577
Modified: 2026-05-07T15:04:56.137
Link: CVE-2026-8026
No data.
OpenCVE Enrichment
Updated: 2026-05-07T17:00:12Z
Github GHSA