Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2098: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Flowring AgentFlow

0
Medium
VulnerabilityCVE-2026-2098cvecve-2026-2098cwe-79
Published: Tue Feb 10 2026 (02/10/2026, 07:06:27 UTC)
Source: CVE Database V5
Vendor/Project: Flowring
Product: AgentFlow

Description

CVE-2026-2098 is a reflected Cross-site Scripting (XSS) vulnerability in Flowring's AgentFlow version 4. 0. *, allowing unauthenticated remote attackers to execute arbitrary JavaScript in users' browsers via phishing. This vulnerability arises from improper input neutralization during web page generation, enabling attackers to craft malicious URLs that, when visited, execute scripts in the victim's context. The CVSS 4. 0 base score is 5. 1 (medium severity), reflecting network attack vector, no privileges required, but user interaction needed. Although no known exploits are reported in the wild, the risk exists especially in phishing scenarios targeting AgentFlow users. European organizations using AgentFlow 4. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:52:03 UTC

Technical Analysis

CVE-2026-2098 identifies a reflected Cross-site Scripting (XSS) vulnerability in Flowring's AgentFlow product, specifically affecting version 4.0.*. The vulnerability stems from improper neutralization of user-supplied input during web page generation, categorized under CWE-79. This flaw allows unauthenticated remote attackers to inject and execute arbitrary JavaScript code in the context of a victim's browser. The attack vector is network-based, requiring no privileges but necessitating user interaction, typically through phishing links crafted to exploit the vulnerability. When a user clicks such a malicious link, the embedded script executes, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. The CVSS 4.0 base score of 5.1 reflects a medium severity, with a low attack complexity and no need for authentication. Although no known exploits have been reported in the wild, the vulnerability poses a tangible risk, especially in environments where AgentFlow is used for critical workflows or sensitive data handling. The lack of available patches at the time of publication increases the urgency for interim mitigations. The vulnerability's impact is limited to users who interact with maliciously crafted URLs, emphasizing the importance of user awareness and technical controls to prevent exploitation.

Potential Impact

For European organizations, this vulnerability could lead to significant security incidents if exploited. Successful attacks may result in unauthorized access to user sessions, leakage of confidential information, and potential compromise of internal systems if attackers leverage stolen credentials or session tokens. Organizations relying on AgentFlow for workflow automation or sensitive operations may face disruption or data integrity issues. The phishing vector increases the risk as attackers can target employees through email or messaging platforms, exploiting human factors. Given the medium severity, the impact is moderate but can escalate if combined with other vulnerabilities or social engineering tactics. Regulatory compliance concerns, such as GDPR, may arise if personal data is exposed due to exploitation. The threat is particularly relevant for sectors with high-value targets, including finance, government, and critical infrastructure within Europe.

Mitigation Recommendations

Immediate mitigation should focus on reducing exposure to phishing and XSS attacks. Organizations should implement web application firewalls (WAFs) with robust XSS detection and blocking capabilities tailored to AgentFlow traffic patterns. User input validation and output encoding must be enforced once vendor patches are released; until then, consider deploying content security policies (CSP) to restrict script execution sources. Security awareness training should emphasize phishing recognition and safe browsing habits. Network segmentation can limit the reach of compromised sessions. Monitoring web server logs for unusual URL patterns or repeated suspicious requests can aid early detection. If possible, restrict access to AgentFlow interfaces to trusted networks or VPNs to reduce attack surface. Engage with Flowring for patch timelines and apply updates promptly. Additionally, consider multi-factor authentication (MFA) to mitigate session hijacking risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
twcert
Date Reserved
2026-02-06T11:02:50.450Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698adb404b57a58fa1eccff6

Added to database: 2/10/2026, 7:16:16 AM

Last enriched: 2/17/2026, 9:52:03 AM

Last updated: 3/28/2026, 1:58:49 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses