CVE-2026-41269: CWE-434: Unrestricted Upload of File with Dangerous Type in FlowiseAI Flowise
FlowiseAI Flowise versions prior to 3. 1. 0 contain a vulnerability that allows attackers to upload JavaScript files by modifying the Chatflow configuration file upload settings. This bypasses frontend restrictions and enables persistent storage of malicious Node. js web shells on the server, potentially leading to remote code execution. The vulnerability is identified as CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS score of 7. 1, indicating high severity. A fix for this issue is available starting from version 3. 1. 0.
AI Analysis
Technical Summary
The vulnerability in FlowiseAI Flowise before version 3.1.0 involves improper validation of file upload MIME types in the Chatflow configuration. Attackers can modify upload settings to allow the application/javascript MIME type, enabling them to upload .js files despite frontend restrictions. This can result in persistent malicious Node.js web shells on the server, which may lead to remote code execution. The issue is classified under CWE-434 and has a CVSS 3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N). The vulnerability is fixed in version 3.1.0.
Potential Impact
Successful exploitation allows an attacker with limited privileges to upload malicious JavaScript files to the server, potentially enabling persistent remote code execution. This can compromise the integrity of the system and lead to unauthorized code execution. Confidentiality impact is low, integrity impact is high, and availability impact is none according to the CVSS vector.
Mitigation Recommendations
Upgrade FlowiseAI Flowise to version 3.1.0 or later, where this vulnerability is fixed. There is no indication of alternative mitigations or temporary fixes. Patch status is not explicitly stated but the fix is included in the version update. Users should verify they are running version 3.1.0 or newer to mitigate this vulnerability.
CVE-2026-41269: CWE-434: Unrestricted Upload of File with Dangerous Type in FlowiseAI Flowise
Description
FlowiseAI Flowise versions prior to 3. 1. 0 contain a vulnerability that allows attackers to upload JavaScript files by modifying the Chatflow configuration file upload settings. This bypasses frontend restrictions and enables persistent storage of malicious Node. js web shells on the server, potentially leading to remote code execution. The vulnerability is identified as CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS score of 7. 1, indicating high severity. A fix for this issue is available starting from version 3. 1. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in FlowiseAI Flowise before version 3.1.0 involves improper validation of file upload MIME types in the Chatflow configuration. Attackers can modify upload settings to allow the application/javascript MIME type, enabling them to upload .js files despite frontend restrictions. This can result in persistent malicious Node.js web shells on the server, which may lead to remote code execution. The issue is classified under CWE-434 and has a CVSS 3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N). The vulnerability is fixed in version 3.1.0.
Potential Impact
Successful exploitation allows an attacker with limited privileges to upload malicious JavaScript files to the server, potentially enabling persistent remote code execution. This can compromise the integrity of the system and lead to unauthorized code execution. Confidentiality impact is low, integrity impact is high, and availability impact is none according to the CVSS vector.
Mitigation Recommendations
Upgrade FlowiseAI Flowise to version 3.1.0 or later, where this vulnerability is fixed. There is no indication of alternative mitigations or temporary fixes. Patch status is not explicitly stated but the fix is included in the version update. Users should verify they are running version 3.1.0 or newer to mitigate this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-18T14:01:46.801Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69ea782987115cfb6850f82d
Added to database: 4/23/2026, 7:51:05 PM
Last enriched: 4/23/2026, 8:06:36 PM
Last updated: 4/23/2026, 8:57:51 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.