icon

We found results for “

CVE-2025-8943

Date: August 14, 2025

The Custom MCPs feature is designed to execute OS commands, for instance, using tools like "npx" to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.

Severity Score

Severity Score

Weakness Type (CWE)

Missing Authentication for Critical Function

CWE-306

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-78

Missing Authorization

CWE-862

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us