Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-28g4-38q8-3cwc | Flowise: Cypher Injection in GraphCypherQAChain |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 27 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise Flowiseai flowise-components |
|
| Vendors & Products |
Flowiseai
Flowiseai flowise Flowiseai flowise-components |
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GraphCypherQAChain node forwards user-provided input directly into the Cypher query execution pipeline without proper sanitization. An attacker can inject arbitrary Cypher commands that are executed on the underlying Neo4j database, enabling data exfiltration, modification, or deletion. This vulnerability is fixed in 3.1.0. | |
| Title | Flowise: Cypher Injection in GraphCypherQAChain | |
| Weaknesses | CWE-943 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T18:19:51.514Z
Reserved: 2026-04-18T14:01:46.802Z
Link: CVE-2026-41274
Updated: 2026-04-24T16:20:43.147Z
Status : Analyzed
Published: 2026-04-23T22:16:38.740
Modified: 2026-05-04T18:33:02.967
Link: CVE-2026-41274
No data.
OpenCVE Enrichment
Updated: 2026-04-28T14:45:16Z
Github GHSA