Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2095: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Flowring Agentflow

0
Critical
VulnerabilityCVE-2026-2095cvecve-2026-2095cwe-288
Published: Tue Feb 10 2026 (02/10/2026, 06:53:17 UTC)
Source: CVE Database V5
Vendor/Project: Flowring
Product: Agentflow

Description

Agentflow developed by Flowring has an Authentication Bypass vulnerability, allowing unauthenticated remote attackers to exploit a specific functionality to obtain arbitrary user authentication token and log into the system as any user.

AI-Powered Analysis

AILast updated: 02/10/2026, 07:30:59 UTC

Technical Analysis

CVE-2026-2095 is an authentication bypass vulnerability classified under CWE-288, found in the Agentflow product developed by Flowring. This vulnerability allows an unauthenticated remote attacker to bypass authentication mechanisms by exploiting an alternate path or channel within the software. Specifically, the attacker can leverage a particular functionality to obtain arbitrary user authentication tokens, effectively impersonating any user without needing valid credentials. The vulnerability is remotely exploitable without any user interaction or prior privileges, making it highly accessible to attackers. The CVSS 4.0 score of 9.3 indicates a critical severity level, with attack vector being network-based, low attack complexity, no required authentication or user interaction, and high impacts on confidentiality, integrity, and availability. The flaw affects all versions of Agentflow, as indicated by the affected version '0', suggesting no version is immune. No patches or fixes have been published yet, and no known exploits have been observed in the wild, although the potential for exploitation remains significant. The vulnerability's exploitation could allow attackers to gain unauthorized access to sensitive systems, manipulate data, disrupt services, or conduct further lateral movement within affected environments. Given the nature of Agentflow as a software product, organizations relying on it for critical workflows or user authentication are at considerable risk. The vulnerability was reserved and published in early February 2026, with the Taiwanese CERT (twcert) as the assigner, indicating international awareness and coordination. The lack of mitigation or patch at this time necessitates immediate defensive measures to reduce exposure.

Potential Impact

For European organizations, the impact of CVE-2026-2095 is severe. The ability for unauthenticated attackers to impersonate any user compromises the confidentiality of sensitive data, including personal, financial, or intellectual property information. Integrity is at risk as attackers can alter data or system configurations under the guise of legitimate users. Availability may also be affected if attackers disrupt services or lock out legitimate users. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and operations. The breach of authentication mechanisms undermines trust in affected systems and can lead to regulatory penalties under GDPR and other data protection laws if personal data is compromised. Additionally, the vulnerability could facilitate further attacks like privilege escalation, lateral movement, or ransomware deployment within compromised networks. The absence of patches increases the window of exposure, making proactive defense essential. Organizations using Agentflow in Europe must consider the risk of targeted attacks, especially given geopolitical tensions that may motivate threat actors to exploit such vulnerabilities.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict network access to Agentflow instances by applying strict firewall rules and network segmentation to limit exposure to trusted IP addresses only. Employ multi-factor authentication (MFA) at the network or application gateway level to add an additional authentication layer outside the vulnerable software. Monitor authentication logs and network traffic for unusual access patterns or token usage indicative of exploitation attempts. Conduct thorough audits of user sessions and tokens to detect anomalies. If possible, disable or isolate the vulnerable functionality within Agentflow until a patch is available. Engage with Flowring for updates and prioritize patch deployment once released. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting the authentication bypass. Educate security teams on this vulnerability to enhance incident response readiness. Finally, maintain up-to-date backups and incident response plans to mitigate potential damage from successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2026-02-06T11:02:46.628Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698adb404b57a58fa1eccfe8

Added to database: 2/10/2026, 7:16:16 AM

Last enriched: 2/10/2026, 7:30:59 AM

Last updated: 2/10/2026, 12:00:16 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats