Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31829: CWE-918: Server-Side Request Forgery (SSRF) in FlowiseAI Flowise

0
High
VulnerabilityCVE-2026-31829cvecve-2026-31829cwe-918
Published: Tue Mar 10 2026 (03/10/2026, 21:43:58 UTC)
Source: CVE Database V5
Vendor/Project: FlowiseAI
Product: Flowise

Description

CVE-2026-31829 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in FlowiseAI's Flowise product versions prior to 3. 0. 13. The vulnerability arises from an HTTP Node in AgentFlow and Chatflow that allows user-controlled URLs without restrictions, enabling attackers to make the server perform unauthorized HTTP requests to internal or private network resources. This can lead to unauthorized access to sensitive internal services, cloud metadata endpoints, and potentially sensitive data exposure. Exploitation requires low privileges but no user interaction, and the vulnerability has a CVSS score of 7. 1. The issue is fixed in version 3. 0. 13.

AI-Powered Analysis

AILast updated: 03/11/2026, 15:44:06 UTC

Technical Analysis

FlowiseAI's Flowise is a drag-and-drop interface for building customized large language model workflows. Versions prior to 3.0.13 contain a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-31829) due to an HTTP Node component in AgentFlow and Chatflow that performs server-side HTTP requests based on user-supplied URLs. Critically, there are no built-in restrictions on the destination of these requests, allowing attackers to specify URLs targeting internal IP ranges (RFC 1918), localhost, or cloud provider metadata endpoints. This lack of validation enables an attacker interacting with a publicly exposed chatflow to coerce the Flowise server into making arbitrary HTTP requests within its internal network environment. Such requests can be used to access sensitive internal services, retrieve confidential data, or perform reconnaissance on otherwise inaccessible infrastructure. The vulnerability requires only low privileges to exploit and does not require user interaction, increasing its risk. The CVSS v3.1 score of 7.1 reflects high confidentiality and integrity impact, with limited availability impact. The vulnerability was publicly disclosed on March 10, 2026, and fixed in Flowise version 3.0.13. No known exploits in the wild have been reported to date.

Potential Impact

The SSRF vulnerability in Flowise can have significant impacts on organizations deploying affected versions, especially if the Flowise server is publicly accessible. Attackers can leverage this flaw to access internal network resources that are otherwise protected by network segmentation or firewalls, including sensitive internal APIs, databases, or cloud metadata services that may contain credentials or configuration data. This can lead to data breaches, unauthorized access to internal systems, and potential lateral movement within the network. The integrity of internal services can be compromised if attackers manipulate internal requests or trigger unintended actions. Although availability impact is low, the confidentiality and integrity risks are high. Organizations relying on Flowise for AI workflow automation may face operational disruptions and reputational damage if exploited. The risk is amplified in cloud environments where metadata endpoints provide critical instance identity and credential information.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Flowise to version 3.0.13 or later, where the SSRF issue is fixed. If upgrading is not immediately possible, implement strict network-level controls such as firewall rules or egress filtering to prevent the Flowise server from making HTTP requests to internal IP ranges (RFC 1918), localhost (127.0.0.1), and cloud metadata service IP addresses (e.g., 169.254.169.254). Additionally, apply application-layer input validation to restrict or sanitize user-supplied URLs in the HTTP Node to allow only trusted external domains. Monitoring and logging HTTP requests originating from the Flowise server can help detect suspicious activity. Employ network segmentation to isolate the Flowise server from sensitive internal resources. Finally, review and harden access controls on internal services to minimize the impact of potential SSRF exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T17:41:56.077Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b18a712f860ef9431b626c

Added to database: 3/11/2026, 3:29:53 PM

Last enriched: 3/11/2026, 3:44:06 PM

Last updated: 3/11/2026, 4:31:21 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses