Skip to main content

CVE-2025-59527: CWE-918: Server-Side Request Forgery (SSRF) in FlowiseAI Flowise

High
VulnerabilityCVE-2025-59527cvecve-2025-59527cwe-918
Published: Mon Sep 22 2025 (09/22/2025, 19:48:42 UTC)
Source: CVE Database V5
Vendor/Project: FlowiseAI
Product: Flowise

Description

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, a Server-Side Request Forgery (SSRF) vulnerability was discovered in the /api/v1/fetch-links endpoint of the Flowise application. This vulnerability allows an attacker to use the Flowise server as a proxy to access internal network web services and explore their link structures. This issue has been patched in version 3.0.6.

AI-Powered Analysis

AILast updated: 09/22/2025, 19:53:44 UTC

Technical Analysis

CVE-2025-59527 is a Server-Side Request Forgery (SSRF) vulnerability identified in FlowiseAI's Flowise product, specifically in version 3.0.5. Flowise is a drag-and-drop interface designed to build customized large language model workflows. The vulnerability resides in the /api/v1/fetch-links endpoint, which improperly validates user-supplied URLs or links. This flaw allows an unauthenticated attacker to coerce the Flowise server into making arbitrary HTTP requests on their behalf. As a result, the attacker can use the server as a proxy to access internal network resources that are otherwise inaccessible externally. This can lead to reconnaissance of internal web services and their link structures, potentially exposing sensitive internal endpoints or configurations. The vulnerability has a CVSS v3.1 base score of 7.5 (high severity) with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating that it is remotely exploitable without authentication or user interaction, and primarily impacts confidentiality by exposing internal network information. The vulnerability does not impact integrity or availability directly. The issue was patched in Flowise version 3.0.6, and no known exploits have been reported in the wild as of the publication date (September 22, 2025).

Potential Impact

For European organizations using Flowise 3.0.5, this SSRF vulnerability poses a significant risk to internal network confidentiality. Attackers can leverage the Flowise server to bypass perimeter defenses and access internal web services, potentially exposing sensitive data, internal APIs, or administrative interfaces that are not intended for external access. This could facilitate further lateral movement or targeted attacks within the network. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and critical infrastructure, may face compliance risks if internal data is exposed. Additionally, the ability to map internal link structures can aid attackers in planning more sophisticated attacks. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely and at scale if the vulnerable version is internet-facing. However, the absence of known exploits in the wild suggests limited active exploitation currently, but the risk remains high if unpatched.

Mitigation Recommendations

European organizations should immediately upgrade Flowise installations from version 3.0.5 to version 3.0.6 or later, where the SSRF vulnerability has been patched. In addition to patching, organizations should implement network segmentation and firewall rules to restrict outbound HTTP requests from application servers to only necessary destinations, reducing the risk of SSRF exploitation. Employing Web Application Firewalls (WAFs) with rules to detect and block SSRF patterns targeting internal IP ranges can provide additional protection. Monitoring and logging outbound requests from Flowise servers can help detect anomalous activity indicative of SSRF exploitation attempts. Organizations should also review and restrict access to the /api/v1/fetch-links endpoint, applying authentication or IP whitelisting where feasible. Regular vulnerability scanning and penetration testing focused on SSRF and related issues should be incorporated into security programs to identify similar risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-17T17:04:20.372Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d1a936f1c6cd98eca24e05

Added to database: 9/22/2025, 7:53:26 PM

Last enriched: 9/22/2025, 7:53:44 PM

Last updated: 9/22/2025, 10:41:56 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats