{"id":45186,"date":"2026-04-07T22:44:56","date_gmt":"2026-04-07T14:44:56","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed\/"},"modified":"2026-04-07T22:44:56","modified_gmt":"2026-04-07T14:44:56","slug":"flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed\/","title":{"rendered":"Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCGR6ZfT0_UppVPQsgk7lwTbzfybdDFY-HeJi9F6VE6HuN7-Ja-lpveDnPA-kcS7x8l1oZ0lUqPoEFdRTOMt0Z8H6EeT_NadV_P7bjlh8Je6Q-T5KAlOCzOWt-LyY3jY8RsTlRTUzuXsVwf_gs-_KyXw8G_LcFz2dY-2P9XozQWy2p9PneNGUMctvpIZYM\/s1600\/flowise.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCGR6ZfT0_UppVPQsgk7lwTbzfybdDFY-HeJi9F6VE6HuN7-Ja-lpveDnPA-kcS7x8l1oZ0lUqPoEFdRTOMt0Z8H6EeT_NadV_P7bjlh8Je6Q-T5KAlOCzOWt-LyY3jY8RsTlRTUzuXsVwf_gs-_KyXw8G_LcFz2dY-2P9XozQWy2p9PneNGUMctvpIZYM\/s1600\/flowise.jpg\" alt=\"Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed\"\/><\/a><\/div>\n<p>Threat actors are exploiting a maximum-severity security flaw in <b>Flowise<\/b>, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck.<\/p>\n<p>The vulnerability in question&nbsp;is <strong>CVE-2025-59528<\/strong> (CVSS score: 10.0), a code injection vulnerability that could result in remote code execution.<\/p>\n<p>&#8220;The CustomMCP node allows users to input configuration settings for connecting to an external MCP (Model Context Protocol) server,&#8221;&nbsp;Flowise <a href=\"https:\/\/github.com\/FlowiseAI\/Flowise\/security\/advisories\/GHSA-3gcm-f6qx-ff7p\">said<\/a> in an advisory released in September 2025. &#8220;This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation.&#8221;<\/p>\n<p>Flowise noted that successful exploitation of the vulnerability can allow access to dangerous modules such as child_process (command execution) and fs (file system), as it runs with full Node.js&nbsp;runtime privileges.<\/p>\n<p>Put differently, a threat actor&nbsp;who weaponizes the flaw can execute arbitrary JavaScript code on the Flowise server, leading to full system compromise, file system access, command execution, and sensitive&nbsp;data exfiltration.<\/p>\n<p>&#8220;As only an API token is required, this poses an extreme security risk to business continuity and customer data,&#8221; Flowise added. It&nbsp;credited Kim SooHyun with discovering and reporting the&nbsp;flaw. The issue was&nbsp;addressed in version 3.0.6&nbsp;of the npm&nbsp;package.<\/p>\n<p>According to details shared by VulnCheck, exploitation activity against the vulnerability has originated from a single Starlink IP address. CVE-2025-59528 is&nbsp;the <a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7446686314562850817\/\">third Flowise&nbsp;flaw<\/a> with in-the-wild exploitation&nbsp;after <a href=\"https:\/\/github.com\/advisories\/GHSA-2vv2-3x8x-4gv7\">CVE-2025-8943<\/a> (CVSS score: 9.8), an operating system command remote code execution,&nbsp;and <a href=\"https:\/\/github.com\/advisories\/GHSA-69jq-qr7w-j7qh\">CVE-2025-26319<\/a> (CVSS score: 8.9), an arbitrary file&nbsp;upload.<\/p>\n<p>&#8220;This is a critical-severity bug in a popular AI platform used&nbsp;by a number&nbsp;of large corporations,&#8221; Caitlin Condon, vice president of security research at VulnCheck, told The Hacker News in a statement.<\/p>\n<p>&#8220;This specific vulnerability has been public for more than six months, which means defenders have had time to prioritize and patch the vulnerability. The&nbsp;internet-facing attack surface area of 12,000+ exposed instances makes the active scanning and exploitation attempts we&#8217;re seeing more serious, as it means attackers have plenty of&nbsp;targets to opportunistically reconnoiter and&nbsp;exploit.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45186","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45186"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45186\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}