Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57164: n/a

0
Medium
VulnerabilityCVE-2025-57164cvecve-2025-57164
Published: Fri Oct 17 2025 (10/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-57164 is a medium severity remote code execution vulnerability in Flowise up to version 3. 0. 4. It arises from unsanitized evaluation of user input in the 'Supabase RPC Filter' field, allowing attackers to execute arbitrary code remotely without authentication or user interaction. The vulnerability is linked to CWE-77, indicating improper neutralization of special elements used in commands. Although no known exploits are currently in the wild, the vulnerability poses a risk to confidentiality and integrity. European organizations using Flowise, especially in sectors relying on Supabase integrations, should prioritize patching or mitigating this flaw. The vulnerability’s network attack vector and lack of required privileges increase its risk profile. Countries with higher adoption of Flowise or Supabase-based solutions, such as Germany, the UK, and the Netherlands, are more likely to be affected. Immediate mitigation includes input validation, restricting RPC filter usage, and monitoring for suspicious activity.

AI-Powered Analysis

AILast updated: 10/24/2025, 18:21:39 UTC

Technical Analysis

CVE-2025-57164 is a remote code execution (RCE) vulnerability affecting Flowise through version 3.0.4. The root cause is the unsanitized evaluation of user-supplied input in the 'Supabase RPC Filter' field, which allows attackers to inject and execute arbitrary commands on the server. This vulnerability is categorized under CWE-77, which involves improper neutralization of special elements used in OS commands or system calls. The vulnerability can be exploited remotely over the network without requiring any privileges or user interaction, making it accessible to unauthenticated attackers. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the limited impact on availability and partial impact on confidentiality and integrity. Exploitation could lead to unauthorized disclosure of sensitive data or manipulation of system behavior, potentially compromising the integrity of the affected systems. No patches or official fixes have been released as of the publication date, and no known exploits are currently reported in the wild. The vulnerability specifically targets the Supabase RPC Filter functionality within Flowise, a component that likely interfaces with backend databases or services, increasing the risk of data exposure or backend compromise. Given the nature of the vulnerability, attackers could craft malicious payloads that bypass input validation and execute commands on the host, potentially leading to further lateral movement or data exfiltration.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of data processed through Flowise, especially in environments leveraging Supabase for backend operations. Unauthorized remote code execution could allow attackers to access sensitive customer or operational data, modify application behavior, or disrupt business processes. Sectors such as finance, healthcare, and critical infrastructure that rely on Flowise for data workflows or automation could face regulatory and reputational damage if exploited. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation attempts. Additionally, organizations may face compliance issues under GDPR if personal data is compromised. The medium severity rating suggests that while availability impact is limited, the potential for data leakage and unauthorized system control remains a serious concern. Without timely mitigation, attackers could use this vulnerability as an entry point for broader network compromise within European enterprises.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include disabling or restricting access to the 'Supabase RPC Filter' feature if not essential, applying strict input validation and sanitization on all user inputs related to RPC filters, and employing web application firewalls (WAFs) to detect and block suspicious payloads targeting this vector. Network segmentation should be enforced to limit the exposure of Flowise instances to untrusted networks. Monitoring and logging of RPC filter usage should be enhanced to identify anomalous or unauthorized commands. Organizations should also review and harden backend Supabase configurations to minimize the impact of potential command execution. Regular security assessments and penetration testing focused on this vulnerability can help identify exploitation attempts. Finally, staying updated with vendor advisories for patches or updates is critical to apply fixes promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f284899c34d0947f39a003

Added to database: 10/17/2025, 6:01:45 PM

Last enriched: 10/24/2025, 6:21:39 PM

Last updated: 12/4/2025, 11:27:37 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats