Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30822: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in FlowiseAI Flowise

0
High
VulnerabilityCVE-2026-30822cvecve-2026-30822cwe-915
Published: Sat Mar 07 2026 (03/07/2026, 05:08:55 UTC)
Source: CVE Database V5
Vendor/Project: FlowiseAI
Product: Flowise

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in version 3.0.13.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:46:30 UTC

Technical Analysis

CVE-2026-30822 is a vulnerability identified in FlowiseAI's Flowise, a drag-and-drop interface for building customized large language model workflows. The flaw exists in versions prior to 3.0.13 and involves improper control over modification of dynamically-determined object attributes, classified under CWE-915. Specifically, unauthenticated users can inject arbitrary values into internal database fields during the creation of leads, which suggests insufficient validation or sanitization of user-supplied input before it is stored or processed. This injection capability can compromise the confidentiality and integrity of the database by allowing attackers to manipulate stored data, potentially leading to unauthorized data disclosure or corruption. The vulnerability does not require authentication or user interaction, but the attack complexity is rated high, indicating some conditions or knowledge are necessary to exploit it. The CVSS v3.0 score is 7.7 (high), reflecting the significant impact on confidentiality and integrity, with a low impact on availability. The issue was publicly disclosed and patched on March 7, 2026, with no known exploits reported in the wild at the time of publication. The vulnerability highlights the risks of insufficient input validation and dynamic attribute modification in web applications managing sensitive data.

Potential Impact

The vulnerability allows unauthenticated attackers to inject arbitrary data into internal database fields, which can lead to unauthorized disclosure or alteration of sensitive information. This compromises the confidentiality and integrity of the affected systems. Organizations relying on Flowise for managing large language model workflows and lead data may face data corruption, leakage of sensitive business or user information, and potential downstream impacts on AI model behavior or decision-making processes. Although availability impact is low, the trustworthiness and security of data are severely undermined, which can affect compliance with data protection regulations and damage organizational reputation. The lack of authentication requirement broadens the attack surface, increasing risk especially for publicly accessible deployments. The high attack complexity may limit exploitation to skilled attackers or those with specific knowledge, but the potential damage remains significant.

Mitigation Recommendations

Organizations should immediately upgrade Flowise to version 3.0.13 or later where the vulnerability is patched. In addition to patching, implement strict input validation and sanitization on all user-supplied data, especially for dynamically determined object attributes and database fields. Employ application-layer access controls to restrict modification of sensitive data to authenticated and authorized users only. Conduct thorough code reviews and security testing focusing on dynamic attribute handling and injection vectors. Monitor logs for unusual lead creation activities or anomalous database modifications indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with custom rules to detect and block injection patterns targeting Flowise endpoints. Finally, maintain an incident response plan to quickly address any suspected compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-05T21:06:44.605Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69abb493c48b3f10ff564c16

Added to database: 3/7/2026, 5:16:03 AM

Last enriched: 3/14/2026, 7:46:30 PM

Last updated: 4/22/2026, 2:19:00 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses