CVE-2026-30821: CWE-434: Unrestricted Upload of File with Dangerous Type in FlowiseAI Flowise
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS, allowing unauthenticated access to the file upload API. While the server validates uploads based on the MIME types defined in chatbotConfig.fullFileUpload.allowedUploadFileTypes, it implicitly trusts the client-provided Content-Type header (file.mimetype) without verifying the file's actual content (magic bytes) or extension (file.originalname). Consequently, an attacker can bypass this restriction by spoofing the Content-Type as a permitted type (e.g., application/pdf) while uploading malicious scripts or arbitrary files. Once uploaded via addArrayFilesToStorage, these files persist in backend storage (S3, GCS, or local disk). This vulnerability serves as a critical entry point that, when chained with other features like static hosting or file retrieval, can lead to Stored XSS, malicious file hosting, or Remote Code Execution (RCE). This issue has been patched in version 3.0.13.
AI Analysis
Technical Summary
FlowiseAI's Flowise product, a drag-and-drop interface for building customized large language model flows, contains a critical vulnerability identified as CVE-2026-30821 (CWE-434) affecting versions prior to 3.0.13. The vulnerability arises from the /api/v1/attachments/:chatflowId/:chatId endpoint, which is included in a whitelist allowing unauthenticated access to file uploads. The server-side validation relies solely on the MIME types listed in chatbotConfig.fullFileUpload.allowedUploadFileTypes and trusts the Content-Type header sent by the client without verifying the actual file content (magic bytes) or file extension. This design flaw enables attackers to bypass restrictions by spoofing the Content-Type header to an allowed type such as application/pdf while uploading malicious files like scripts or executables. These files are then stored persistently in backend storage systems, including Amazon S3, Google Cloud Storage, or local disk. The vulnerability becomes particularly dangerous when combined with other Flowise features such as static hosting or file retrieval mechanisms, which can be exploited to execute Stored XSS attacks, host malicious files for distribution, or achieve Remote Code Execution (RCE) on the server. The vulnerability has a CVSS 4.0 base score of 8.2, reflecting its high severity. Exploitation does not require authentication or user interaction but has a high attack complexity since chaining with other features is necessary to realize full impact. The issue was patched in Flowise version 3.0.13, and users are strongly advised to upgrade to mitigate the risk.
Potential Impact
The impact of CVE-2026-30821 is significant for organizations using vulnerable versions of Flowise, especially those exposing the file upload API to untrusted or public networks. Successful exploitation can lead to persistent storage of malicious files, enabling attackers to conduct Stored XSS attacks that compromise user sessions and data confidentiality. Malicious file hosting can facilitate distribution of malware or phishing content, damaging organizational reputation and potentially leading to regulatory penalties. The most severe impact is the potential for Remote Code Execution (RCE), which could allow attackers to execute arbitrary code on the server, leading to full system compromise, data theft, lateral movement within networks, and disruption of services. Since the vulnerability requires no authentication and no user interaction, it poses a high risk of automated exploitation if the vulnerable endpoint is accessible. Organizations relying on Flowise for AI workflow management may face operational disruptions, data breaches, and compliance violations if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Flowise to version 3.0.13 or later, where the issue is patched. Beyond upgrading, administrators should implement strict server-side validation of uploaded files by verifying the actual file content using magic byte inspection and validating file extensions against allowed lists rather than relying solely on client-provided MIME types. Restrict access to the file upload API endpoint by enforcing authentication and authorization controls, limiting uploads to trusted users only. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious upload attempts. Disable or tightly control features like static hosting or direct file retrieval that could be abused to serve malicious content. Regularly audit and monitor uploaded files stored in backend storage for unusual or unauthorized content. Implement logging and alerting on file upload activities to detect potential exploitation attempts early. Finally, conduct security awareness training for developers and administrators on secure file handling practices.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-30821: CWE-434: Unrestricted Upload of File with Dangerous Type in FlowiseAI Flowise
Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS, allowing unauthenticated access to the file upload API. While the server validates uploads based on the MIME types defined in chatbotConfig.fullFileUpload.allowedUploadFileTypes, it implicitly trusts the client-provided Content-Type header (file.mimetype) without verifying the file's actual content (magic bytes) or extension (file.originalname). Consequently, an attacker can bypass this restriction by spoofing the Content-Type as a permitted type (e.g., application/pdf) while uploading malicious scripts or arbitrary files. Once uploaded via addArrayFilesToStorage, these files persist in backend storage (S3, GCS, or local disk). This vulnerability serves as a critical entry point that, when chained with other features like static hosting or file retrieval, can lead to Stored XSS, malicious file hosting, or Remote Code Execution (RCE). This issue has been patched in version 3.0.13.
AI-Powered Analysis
Technical Analysis
FlowiseAI's Flowise product, a drag-and-drop interface for building customized large language model flows, contains a critical vulnerability identified as CVE-2026-30821 (CWE-434) affecting versions prior to 3.0.13. The vulnerability arises from the /api/v1/attachments/:chatflowId/:chatId endpoint, which is included in a whitelist allowing unauthenticated access to file uploads. The server-side validation relies solely on the MIME types listed in chatbotConfig.fullFileUpload.allowedUploadFileTypes and trusts the Content-Type header sent by the client without verifying the actual file content (magic bytes) or file extension. This design flaw enables attackers to bypass restrictions by spoofing the Content-Type header to an allowed type such as application/pdf while uploading malicious files like scripts or executables. These files are then stored persistently in backend storage systems, including Amazon S3, Google Cloud Storage, or local disk. The vulnerability becomes particularly dangerous when combined with other Flowise features such as static hosting or file retrieval mechanisms, which can be exploited to execute Stored XSS attacks, host malicious files for distribution, or achieve Remote Code Execution (RCE) on the server. The vulnerability has a CVSS 4.0 base score of 8.2, reflecting its high severity. Exploitation does not require authentication or user interaction but has a high attack complexity since chaining with other features is necessary to realize full impact. The issue was patched in Flowise version 3.0.13, and users are strongly advised to upgrade to mitigate the risk.
Potential Impact
The impact of CVE-2026-30821 is significant for organizations using vulnerable versions of Flowise, especially those exposing the file upload API to untrusted or public networks. Successful exploitation can lead to persistent storage of malicious files, enabling attackers to conduct Stored XSS attacks that compromise user sessions and data confidentiality. Malicious file hosting can facilitate distribution of malware or phishing content, damaging organizational reputation and potentially leading to regulatory penalties. The most severe impact is the potential for Remote Code Execution (RCE), which could allow attackers to execute arbitrary code on the server, leading to full system compromise, data theft, lateral movement within networks, and disruption of services. Since the vulnerability requires no authentication and no user interaction, it poses a high risk of automated exploitation if the vulnerable endpoint is accessible. Organizations relying on Flowise for AI workflow management may face operational disruptions, data breaches, and compliance violations if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Flowise to version 3.0.13 or later, where the issue is patched. Beyond upgrading, administrators should implement strict server-side validation of uploaded files by verifying the actual file content using magic byte inspection and validating file extensions against allowed lists rather than relying solely on client-provided MIME types. Restrict access to the file upload API endpoint by enforcing authentication and authorization controls, limiting uploads to trusted users only. Employ network-level protections such as web application firewalls (WAFs) to detect and block suspicious upload attempts. Disable or tightly control features like static hosting or direct file retrieval that could be abused to serve malicious content. Regularly audit and monitor uploaded files stored in backend storage for unusual or unauthorized content. Implement logging and alerting on file upload activities to detect potential exploitation attempts early. Finally, conduct security awareness training for developers and administrators on secure file handling practices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-05T21:06:44.605Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69abb493c48b3f10ff564c12
Added to database: 3/7/2026, 5:16:03 AM
Last enriched: 3/7/2026, 5:30:34 AM
Last updated: 3/8/2026, 4:15:17 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.