CVE-2025-59528: CWE-94: Improper Control of Generation of Code ('Code Injection') in FlowiseAI Flowise
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.
AI Analysis
Technical Summary
CVE-2025-59528 is a critical remote code execution (RCE) vulnerability affecting FlowiseAI's Flowise product, specifically version 3.0.5. Flowise is a drag-and-drop interface designed to build customized large language model flows. The vulnerability resides in the CustomMCP node, which allows users to input configuration settings for connecting to an external MCP server. The issue arises because the node processes the user-supplied mcpServerConfig string by passing it directly to the JavaScript Function() constructor inside the convertToValidJSONString function without any security validation or sanitization. This means that arbitrary JavaScript code embedded in the input is executed with full Node.js runtime privileges. Since Node.js has access to powerful modules such as child_process and fs, an attacker can execute arbitrary system commands, read or write files, and potentially take full control of the host system. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code, i.e., Code Injection). The CVSS v3.1 score is 10.0 (critical), reflecting its ease of exploitation (network attack vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the vulnerability was publicly disclosed on 2025-09-22 and patched in Flowise version 3.0.6. Organizations running version 3.0.5 or earlier are at immediate risk if their Flowise instances are exposed to untrusted users or networks. Attackers could leverage this flaw to fully compromise affected systems, steal sensitive data, disrupt services, or pivot within internal networks.
Potential Impact
For European organizations, the impact of this vulnerability can be severe, especially for those using Flowise in production environments for AI workflow orchestration. Successful exploitation can lead to full system compromise, allowing attackers to exfiltrate sensitive data, disrupt AI services, or use compromised hosts as footholds for further attacks. This is particularly critical for sectors relying on AI-driven decision-making or data processing, such as finance, healthcare, manufacturing, and government agencies. The ability to execute arbitrary code remotely without authentication means that any exposed Flowise instance is a high-value target. Additionally, the compromise of AI workflows could undermine trust in automated processes and lead to regulatory and compliance issues under GDPR and other European data protection laws. The critical severity and network-exploitable nature of this vulnerability necessitate immediate attention to prevent potential data breaches and operational disruptions.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Flowise to version 3.0.6 or later, where this vulnerability is patched. 2. Network segmentation: Restrict access to Flowise management interfaces to trusted internal networks or VPNs to minimize exposure to untrusted actors. 3. Input validation: Although the patch addresses the root cause, additional input validation and sanitization should be implemented to prevent arbitrary code execution. 4. Monitoring and detection: Deploy monitoring solutions to detect anomalous behavior on hosts running Flowise, such as unexpected child process creation or unusual file system access. 5. Access controls: Enforce strict access controls and authentication mechanisms around Flowise interfaces to reduce the risk of unauthorized configuration changes. 6. Incident response readiness: Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation is suspected. 7. Vendor communication: Stay informed via FlowiseAI security advisories for any further updates or mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-59528: CWE-94: Improper Control of Generation of Code ('Code Injection') in FlowiseAI Flowise
Description
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-59528 is a critical remote code execution (RCE) vulnerability affecting FlowiseAI's Flowise product, specifically version 3.0.5. Flowise is a drag-and-drop interface designed to build customized large language model flows. The vulnerability resides in the CustomMCP node, which allows users to input configuration settings for connecting to an external MCP server. The issue arises because the node processes the user-supplied mcpServerConfig string by passing it directly to the JavaScript Function() constructor inside the convertToValidJSONString function without any security validation or sanitization. This means that arbitrary JavaScript code embedded in the input is executed with full Node.js runtime privileges. Since Node.js has access to powerful modules such as child_process and fs, an attacker can execute arbitrary system commands, read or write files, and potentially take full control of the host system. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code, i.e., Code Injection). The CVSS v3.1 score is 10.0 (critical), reflecting its ease of exploitation (network attack vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the vulnerability was publicly disclosed on 2025-09-22 and patched in Flowise version 3.0.6. Organizations running version 3.0.5 or earlier are at immediate risk if their Flowise instances are exposed to untrusted users or networks. Attackers could leverage this flaw to fully compromise affected systems, steal sensitive data, disrupt services, or pivot within internal networks.
Potential Impact
For European organizations, the impact of this vulnerability can be severe, especially for those using Flowise in production environments for AI workflow orchestration. Successful exploitation can lead to full system compromise, allowing attackers to exfiltrate sensitive data, disrupt AI services, or use compromised hosts as footholds for further attacks. This is particularly critical for sectors relying on AI-driven decision-making or data processing, such as finance, healthcare, manufacturing, and government agencies. The ability to execute arbitrary code remotely without authentication means that any exposed Flowise instance is a high-value target. Additionally, the compromise of AI workflows could undermine trust in automated processes and lead to regulatory and compliance issues under GDPR and other European data protection laws. The critical severity and network-exploitable nature of this vulnerability necessitate immediate attention to prevent potential data breaches and operational disruptions.
Mitigation Recommendations
1. Immediate upgrade: Organizations should promptly update Flowise to version 3.0.6 or later, where this vulnerability is patched. 2. Network segmentation: Restrict access to Flowise management interfaces to trusted internal networks or VPNs to minimize exposure to untrusted actors. 3. Input validation: Although the patch addresses the root cause, additional input validation and sanitization should be implemented to prevent arbitrary code execution. 4. Monitoring and detection: Deploy monitoring solutions to detect anomalous behavior on hosts running Flowise, such as unexpected child process creation or unusual file system access. 5. Access controls: Enforce strict access controls and authentication mechanisms around Flowise interfaces to reduce the risk of unauthorized configuration changes. 6. Incident response readiness: Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation is suspected. 7. Vendor communication: Stay informed via FlowiseAI security advisories for any further updates or mitigations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-17T17:04:20.373Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d1aabbdb6dbbc21876f6ab
Added to database: 9/22/2025, 7:59:55 PM
Last enriched: 9/22/2025, 8:00:14 PM
Last updated: 9/22/2025, 9:38:38 PM
Views: 5
Related Threats
CVE-2025-43814: CWE-201 Insertion of Sensitive Information Into Sent Data in Liferay Portal
MediumCVE-2025-10821: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-43810: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal
MediumCVE-2025-10820: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-10819: Improper Authorization in fuyang_lipengjun platform
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.