Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30821: CWE-434: Unrestricted Upload of File with Dangerous Type in FlowiseAI Flowise

0
High
VulnerabilityCVE-2026-30821cvecve-2026-30821cwe-434
Published: Sat Mar 07 2026 (03/07/2026, 05:07:50 UTC)
Source: CVE Database V5
Vendor/Project: FlowiseAI
Product: Flowise

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS, allowing unauthenticated access to the file upload API. While the server validates uploads based on the MIME types defined in chatbotConfig.fullFileUpload.allowedUploadFileTypes, it implicitly trusts the client-provided Content-Type header (file.mimetype) without verifying the file's actual content (magic bytes) or extension (file.originalname). Consequently, an attacker can bypass this restriction by spoofing the Content-Type as a permitted type (e.g., application/pdf) while uploading malicious scripts or arbitrary files. Once uploaded via addArrayFilesToStorage, these files persist in backend storage (S3, GCS, or local disk). This vulnerability serves as a critical entry point that, when chained with other features like static hosting or file retrieval, can lead to Stored XSS, malicious file hosting, or Remote Code Execution (RCE). This issue has been patched in version 3.0.13.

AI-Powered Analysis

AILast updated: 03/07/2026, 05:30:34 UTC

Technical Analysis

FlowiseAI's Flowise product, a drag-and-drop interface for building customized large language model flows, contains a critical vulnerability identified as CVE-2026-30821 (CWE-434) affecting versions prior to 3.0.13. The vulnerability arises from the /api/v1/attachments/:chatflowId/:chatId endpoint, which is included in a whitelist allowing unauthenticated access to file uploads. The server-side validation relies solely on the MIME types listed in chatbotConfig.fullFileUpload.allowedUploadFileTypes and trusts the Content-Type header sent by the client without verifying the actual file content (magic bytes) or file extension. This design flaw enables attackers to bypass restrictions by spoofing the Content-Type header to an allowed type such as application/pdf while uploading malicious files like scripts or executables. These files are then stored persistently in backend storage systems, including Amazon S3, Google Cloud Storage, or local disk. The vulnerability becomes particularly dangerous when combined with other Flowise features such as static hosting or file retrieval mechanisms, which can be exploited to execute Stored XSS attacks, host malicious files for distribution, or achieve Remote Code Execution (RCE) on the server. The vulnerability has a CVSS 4.0 base score of 8.2, reflecting its high severity. Exploitation does not require authentication or user interaction but has a high attack complexity since chaining with other features is necessary to realize full impact. The issue was patched in Flowise version 3.0.13, and users are strongly advised to upgrade to mitigate the risk.

Potential Impact

The impact of CVE-2026-30821 is significant for organizations using vulnerable versions of Flowise, especially those exposing the file upload API to untrusted or public networks. Successful exploitation can lead to persistent storage of malicious files, enabling attackers to conduct Stored XSS attacks that compromise user sessions and data confidentiality. Malicious file hosting can facilitate distribution of malware or phishing content, damaging organizational reputation and potentially leading to regulatory penalties. The most severe impact is the potential for Remote Code Execution (RCE), which could allow attackers to execute arbitrary code on the server, leading to full system compromise, data theft, lateral movement within networks, and disruption of services. Since the vulnerability requires no authentication and no user interaction, it poses a high risk of automated exploitation if the vulnerable endpoint is accessible. Organizations relying on Flowise for AI workflow management may face operational disruptions, data breaches, and compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Flowise to version 3.0.13 or later, where the issue is patched. Beyond upgrading, administrators should implement strict server-side validation of uploaded files by verifying the actual file content using magic byte inspection and validating file extensions against allowed lists rather than relying solely on client-provided MIME types. Restrict access to the file upload API endpoint by enforcing authentication and authorization controls, limiting uploads to trusted users only. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious upload attempts. Disable or tightly control features like static hosting or direct file retrieval that could be abused to serve malicious content. Regularly audit and monitor uploaded files stored in backend storage for unusual or unauthorized content. Implement logging and alerting on file upload activities to detect potential exploitation attempts early. Finally, conduct security awareness training for developers and administrators on secure file handling practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:06:44.605Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69abb493c48b3f10ff564c12

Added to database: 3/7/2026, 5:16:03 AM

Last enriched: 3/7/2026, 5:30:34 AM

Last updated: 3/8/2026, 4:15:17 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses