CVE-2026-31829: CWE-918: Server-Side Request Forgery (SSRF) in FlowiseAI Flowise
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow that performs server-side HTTP requests using user-controlled URLs. By default, there are no restrictions on target hosts, including private/internal IP ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force the Flowise server to make requests to internal network resources that are inaccessible from the public internet. This vulnerability is fixed in 3.0.13.
AI Analysis
Technical Summary
FlowiseAI's Flowise is a drag-and-drop interface for building customized large language model workflows. Versions prior to 3.0.13 contain a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-31829) due to an HTTP Node component in AgentFlow and Chatflow that performs server-side HTTP requests based on user-supplied URLs. Critically, there are no built-in restrictions on the destination of these requests, allowing attackers to specify URLs targeting internal IP ranges (RFC 1918), localhost, or cloud provider metadata endpoints. This lack of validation enables an attacker interacting with a publicly exposed chatflow to coerce the Flowise server into making arbitrary HTTP requests within its internal network environment. Such requests can be used to access sensitive internal services, retrieve confidential data, or perform reconnaissance on otherwise inaccessible infrastructure. The vulnerability requires only low privileges to exploit and does not require user interaction, increasing its risk. The CVSS v3.1 score of 7.1 reflects high confidentiality and integrity impact, with limited availability impact. The vulnerability was publicly disclosed on March 10, 2026, and fixed in Flowise version 3.0.13. No known exploits in the wild have been reported to date.
Potential Impact
The SSRF vulnerability in Flowise can have significant impacts on organizations deploying affected versions, especially if the Flowise server is publicly accessible. Attackers can leverage this flaw to access internal network resources that are otherwise protected by network segmentation or firewalls, including sensitive internal APIs, databases, or cloud metadata services that may contain credentials or configuration data. This can lead to data breaches, unauthorized access to internal systems, and potential lateral movement within the network. The integrity of internal services can be compromised if attackers manipulate internal requests or trigger unintended actions. Although availability impact is low, the confidentiality and integrity risks are high. Organizations relying on Flowise for AI workflow automation may face operational disruptions and reputational damage if exploited. The risk is amplified in cloud environments where metadata endpoints provide critical instance identity and credential information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Flowise to version 3.0.13 or later, where the SSRF issue is fixed. If upgrading is not immediately possible, implement strict network-level controls such as firewall rules or egress filtering to prevent the Flowise server from making HTTP requests to internal IP ranges (RFC 1918), localhost (127.0.0.1), and cloud metadata service IP addresses (e.g., 169.254.169.254). Additionally, apply application-layer input validation to restrict or sanitize user-supplied URLs in the HTTP Node to allow only trusted external domains. Monitoring and logging HTTP requests originating from the Flowise server can help detect suspicious activity. Employ network segmentation to isolate the Flowise server from sensitive internal resources. Finally, review and harden access controls on internal services to minimize the impact of potential SSRF exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-31829: CWE-918: Server-Side Request Forgery (SSRF) in FlowiseAI Flowise
Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow that performs server-side HTTP requests using user-controlled URLs. By default, there are no restrictions on target hosts, including private/internal IP ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force the Flowise server to make requests to internal network resources that are inaccessible from the public internet. This vulnerability is fixed in 3.0.13.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FlowiseAI's Flowise is a drag-and-drop interface for building customized large language model workflows. Versions prior to 3.0.13 contain a Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-31829) due to an HTTP Node component in AgentFlow and Chatflow that performs server-side HTTP requests based on user-supplied URLs. Critically, there are no built-in restrictions on the destination of these requests, allowing attackers to specify URLs targeting internal IP ranges (RFC 1918), localhost, or cloud provider metadata endpoints. This lack of validation enables an attacker interacting with a publicly exposed chatflow to coerce the Flowise server into making arbitrary HTTP requests within its internal network environment. Such requests can be used to access sensitive internal services, retrieve confidential data, or perform reconnaissance on otherwise inaccessible infrastructure. The vulnerability requires only low privileges to exploit and does not require user interaction, increasing its risk. The CVSS v3.1 score of 7.1 reflects high confidentiality and integrity impact, with limited availability impact. The vulnerability was publicly disclosed on March 10, 2026, and fixed in Flowise version 3.0.13. No known exploits in the wild have been reported to date.
Potential Impact
The SSRF vulnerability in Flowise can have significant impacts on organizations deploying affected versions, especially if the Flowise server is publicly accessible. Attackers can leverage this flaw to access internal network resources that are otherwise protected by network segmentation or firewalls, including sensitive internal APIs, databases, or cloud metadata services that may contain credentials or configuration data. This can lead to data breaches, unauthorized access to internal systems, and potential lateral movement within the network. The integrity of internal services can be compromised if attackers manipulate internal requests or trigger unintended actions. Although availability impact is low, the confidentiality and integrity risks are high. Organizations relying on Flowise for AI workflow automation may face operational disruptions and reputational damage if exploited. The risk is amplified in cloud environments where metadata endpoints provide critical instance identity and credential information.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Flowise to version 3.0.13 or later, where the SSRF issue is fixed. If upgrading is not immediately possible, implement strict network-level controls such as firewall rules or egress filtering to prevent the Flowise server from making HTTP requests to internal IP ranges (RFC 1918), localhost (127.0.0.1), and cloud metadata service IP addresses (e.g., 169.254.169.254). Additionally, apply application-layer input validation to restrict or sanitize user-supplied URLs in the HTTP Node to allow only trusted external domains. Monitoring and logging HTTP requests originating from the Flowise server can help detect suspicious activity. Employ network segmentation to isolate the Flowise server from sensitive internal resources. Finally, review and harden access controls on internal services to minimize the impact of potential SSRF exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-09T17:41:56.077Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b18a712f860ef9431b626c
Added to database: 3/11/2026, 3:29:53 PM
Last enriched: 3/11/2026, 3:44:06 PM
Last updated: 4/25/2026, 1:32:31 AM
Views: 113
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.