Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2097: CWE-434 Unrestricted Upload of File with Dangerous Type in Flowring Agentflow

0
High
VulnerabilityCVE-2026-2097cvecve-2026-2097cwe-434
Published: Tue Feb 10 2026 (02/10/2026, 07:02:30 UTC)
Source: CVE Database V5
Vendor/Project: Flowring
Product: Agentflow

Description

CVE-2026-2097 is a high-severity vulnerability in Flowring's Agentflow product that allows authenticated remote attackers to upload arbitrary files without proper validation. This unrestricted file upload can lead to execution of web shell backdoors, enabling arbitrary code execution on the affected server. The vulnerability requires low privileges but no user interaction, making exploitation relatively straightforward once authenticated. Although no known exploits are currently reported in the wild, the impact on confidentiality, integrity, and availability is significant. European organizations using Agentflow are at risk, especially those with exposed or internet-facing instances. Mitigation requires strict validation of uploaded files, implementing allowlists for file types, and restricting upload permissions. Countries with higher adoption of Flowring Agentflow or critical infrastructure using it are more likely to be targeted. Given the CVSS 8. 7 score, this vulnerability demands prompt attention to prevent potential compromise.

AI-Powered Analysis

AILast updated: 02/10/2026, 07:30:33 UTC

Technical Analysis

CVE-2026-2097 is an Arbitrary File Upload vulnerability classified under CWE-434 affecting Flowring's Agentflow product. The flaw arises due to insufficient validation of uploaded files, allowing authenticated attackers to upload files with dangerous types such as web shells. Once uploaded, these malicious files can be executed on the server, resulting in arbitrary code execution. The vulnerability requires only low-level privileges (PR:L) and no user interaction (UI:N), which lowers the barrier for exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no attack vector (AT:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The vulnerability does not require user interaction or scope change, and no known exploits have been reported yet. The affected version is listed as '0', which likely indicates an initial or baseline version of Agentflow. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for organizations to implement compensating controls. This vulnerability can lead to full system compromise, data breaches, and disruption of services if exploited.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly those using Flowring Agentflow in critical infrastructure, government, or enterprise environments. Successful exploitation can lead to unauthorized access, data exfiltration, and persistent backdoors, severely impacting confidentiality and integrity. Availability may also be compromised if attackers deploy ransomware or disrupt services. Since the vulnerability requires authentication but low privileges, insider threats or compromised credentials could facilitate exploitation. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score indicates that once exploited, the damage could be severe. Organizations with internet-facing Agentflow deployments are especially vulnerable to remote attacks. The impact extends beyond individual systems to potentially affect supply chains and interconnected services within Europe.

Mitigation Recommendations

To mitigate CVE-2026-2097, European organizations should implement strict file upload validation mechanisms, including allowlisting of acceptable file types and rejecting all others. Employ server-side checks to verify file contents and extensions, and use sandboxing or isolated environments for processing uploads. Enforce the principle of least privilege by restricting upload permissions to only necessary users and roles. Implement multi-factor authentication to reduce the risk of credential compromise. Monitor logs and network traffic for suspicious upload activity or execution of unexpected files. If possible, isolate Agentflow instances from direct internet exposure using firewalls or VPNs. Regularly audit and update credentials and review user access rights. Until an official patch is released, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious upload attempts. Engage with Flowring for updates and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2026-02-06T11:02:49.215Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698adb404b57a58fa1eccff2

Added to database: 2/10/2026, 7:16:16 AM

Last enriched: 2/10/2026, 7:30:33 AM

Last updated: 2/10/2026, 9:04:03 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats