Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined with a NODE_OPTIONS environment variable injection. This allows for the execution of arbitrary system commands with root privileges within the containerized Flowise instance, requiring only a single HTTP request and no authentication or knowledge of the instance. This vulnerability is fixed in 3.1.0.

INFO

Published Date :

2026-04-23T19:13:36.220Z

Last Modified :

2026-04-23T20:19:47.223Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-41268 vulnerability.

Vendors Products
Flowiseai
  • Flowise
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-41268.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact