The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 CWE-862 |
|
Metrics |
ssvc
|
Sat, 16 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Flowiseai
Flowiseai flowise |
|
Vendors & Products |
Flowiseai
Flowiseai flowise |
Thu, 14 Aug 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands. | |
Title | Unsupervised OS command execution leads to remote code execution by unauthenticated network attackers | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: JFROG
Published: 2025-08-14T09:54:22.531Z
Updated: 2025-08-18T16:47:58.906Z
Reserved: 2025-08-13T13:30:26.091Z
Link: CVE-2025-8943

Updated: 2025-08-18T16:47:51.846Z

Status : Awaiting Analysis
Published: 2025-08-14T10:15:29.637
Modified: 2025-08-18T17:15:31.690
Link: CVE-2025-8943

No data.