| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rh7v-6w34-w2rr | Flowise: File Upload Validation Bypass in createAttachment |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Flowiseai
Flowiseai flowise |
Thu, 23 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type. This lets an attacker upload .js files even though the frontend doesn’t normally allow JavaScript uploads. This enables attackers to persistently store malicious Node.js web shells on the server, potentially leading to Remote Code Execution (RCE). This vulnerability is fixed in 3.1.0. | |
| Title | Flowise: File Upload Validation Bypass in createAttachment | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T18:20:27.952Z
Reserved: 2026-04-18T14:01:46.801Z
Link: CVE-2026-41269
Updated: 2026-04-24T14:21:18.400Z
Status : Modified
Published: 2026-04-23T20:16:15.417
Modified: 2026-04-24T19:17:11.417
Link: CVE-2026-41269
No data.
OpenCVE Enrichment
Updated: 2026-04-28T07:30:26Z
Github GHSA