Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Flowise 3.0.4 - Remote Code Execution (RCE)

0
Critical
Published: Fri Oct 31 2025 (10/31/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Flowise 3.0.4 - Remote Code Execution (RCE)

Technical Details

Edb Id
52440
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Flowise 3.0.4 - Remote Code Execution (RCE)

# Exploit Title: Flowise 3.0.4 - Remote Code Execution (RCE)
# Date: 10/11/2025
# Exploit Author: [nltt0] (https://github.com/nltt-br))
# Vendor Homepage: https://flowiseai.com/
# Software Link: https://github.com/FlowiseAI/Flowise
# Version: < 3.0.5
# CVE: CVE-2025-59528

from requests import post, session
from argparse import ArgumentParser

banner = r"""
_____       _                              _____ 
/  __ \     | |                            /  ___|
| /  \/ __ _| | __ _ _ __   __ _  ___  
... (2390 more characters)
Code Length: 2,890 characters

Threat ID: 6904bcc1f54b4a89977a2e93

Added to database: 10/31/2025, 1:42:25 PM

Last updated: 10/31/2025, 5:12:14 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats