Skip to main content

CVE-2025-58434: CWE-306: Missing Authentication for Critical Function in FlowiseAI Flowise

Critical
VulnerabilityCVE-2025-58434cvecve-2025-58434cwe-306
Published: Fri Sep 12 2025 (09/12/2025, 17:37:08 UTC)
Source: CVE Database V5
Vendor/Project: FlowiseAI
Product: Flowise

Description

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5 and earlier, the `forgot-password` endpoint in Flowise returns sensitive information including a valid password reset `tempToken` without authentication or verification. This enables any attacker to generate a reset token for arbitrary users and directly reset their password, leading to a complete account takeover (ATO). This vulnerability applies to both the cloud service (`cloud.flowiseai.com`) and self-hosted/local Flowise deployments that expose the same API. Commit 9e178d68873eb876073846433a596590d3d9c863 secures password reset endpoints. Several recommended remediation steps are available. Do not return reset tokens or sensitive account details in API responses. Tokens must only be delivered securely via the registered email channel. Ensure `forgot-password` responds with a generic success message regardless of input, to avoid user enumeration. Require strong validation of the `tempToken` (e.g., single-use, short expiry, tied to request origin, validated against email delivery). Apply the same fixes to both cloud and self-hosted/local deployments. Log and monitor password reset requests for suspicious activity. Consider multi-factor verification for sensitive accounts.

AI-Powered Analysis

AILast updated: 09/12/2025, 17:45:14 UTC

Technical Analysis

CVE-2025-58434 is a critical vulnerability affecting FlowiseAI's Flowise product, versions 3.0.5 and earlier. Flowise is a drag-and-drop interface used to build customized large language model workflows. The vulnerability lies in the 'forgot-password' API endpoint, which returns sensitive information, specifically a valid password reset temporary token (tempToken), without requiring any authentication or verification. This flaw allows an unauthenticated attacker to generate a reset token for any arbitrary user and reset their password, resulting in a complete account takeover (ATO). The vulnerability affects both the cloud-hosted service (cloud.flowiseai.com) and self-hosted/local deployments exposing the same API. The root cause is a missing authentication control on a critical function (CWE-306). The issue was addressed in a commit that secures the password reset endpoints by ensuring reset tokens are not returned in API responses but are instead delivered securely via registered email channels. Additionally, the fix includes returning generic success messages to prevent user enumeration, enforcing strong validation of the tempToken (such as single-use, short expiry, binding to request origin, and validation against email delivery), and logging and monitoring password reset requests for suspicious activity. Multi-factor verification is also recommended for sensitive accounts. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's ease of exploitation (no privileges or user interaction required), and its high impact on confidentiality, integrity, and availability due to full account takeover potential.

Potential Impact

For European organizations using Flowise, either via the cloud service or self-hosted deployments, this vulnerability poses a severe risk. Attackers can hijack user accounts, potentially gaining access to sensitive data, intellectual property, or administrative controls within the AI workflow environment. Given Flowise's role in building customized large language model flows, compromised accounts could lead to manipulation of AI workflows, data leakage, or disruption of AI-driven business processes. This could impact confidentiality (exposure of sensitive data), integrity (unauthorized modification of AI workflows), and availability (disruption of services). The lack of authentication on the password reset function means attackers can operate remotely without user interaction, increasing the attack surface. European organizations in sectors relying on AI workflows—such as finance, healthcare, research, and technology—are particularly at risk. The vulnerability also undermines trust in AI tooling security, which is critical for compliance with European data protection regulations like GDPR.

Mitigation Recommendations

Organizations should immediately upgrade Flowise to versions later than 3.0.5 where the vulnerability is patched. For self-hosted deployments, ensure that password reset endpoints do not return tokens or sensitive information in API responses. Implement strict controls so that reset tokens are only sent via registered email channels. Modify the 'forgot-password' endpoint to always return a generic success message regardless of input to prevent user enumeration. Enforce strong validation of reset tokens, including single-use tokens with short expiration times, binding tokens to the request origin, and verifying tokens against email delivery records. Enable detailed logging and monitoring of password reset requests to detect suspicious or anomalous activity promptly. Consider implementing multi-factor authentication (MFA) for all accounts, especially those with elevated privileges or access to sensitive AI workflows. Network-level protections such as API gateways or web application firewalls (WAFs) can be configured to monitor and restrict suspicious password reset requests. Regular security audits and penetration testing of the Flowise deployment should be conducted to ensure no residual vulnerabilities remain.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-01T20:03:06.531Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c45b66055763ea6cf4ba8d

Added to database: 9/12/2025, 5:41:58 PM

Last enriched: 9/12/2025, 5:45:14 PM

Last updated: 9/12/2025, 5:45:14 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats