| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6f7g-v4pp-r667 | Flowise: Unauthenticated OAuth 2.0 Access Token Disclosure via Public Chatflow in Flowise |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Flowiseai
Flowiseai flowise |
|
| Metrics |
cvssV3_1
|
Thu, 23 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated with a public chatflow. By accessing a public chatflow configuration endpoint, an attacker can retrieve internal workflow data, including OAuth credential identifiers, which can then be used to refresh and obtain valid OAuth 2.0 access tokens without authentication. This vulnerability is fixed in 3.1.0. | |
| Title | Flowise: Unauthenticated OAuth 2.0 Access Token Disclosure via Public Chatflow | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T18:20:20.316Z
Reserved: 2026-04-18T14:01:46.801Z
Link: CVE-2026-41273
Updated: 2026-04-24T14:33:32.205Z
Status : Modified
Published: 2026-04-23T20:16:15.973
Modified: 2026-04-24T19:17:11.530
Link: CVE-2026-41273
No data.
OpenCVE Enrichment
Updated: 2026-04-28T14:45:16Z
Github GHSA