CVE-2025-34267
📋 TL;DR
Flowise versions 3.0.1 through 3.0.7 and all later versions with 'ALLOW_BUILTIN_DEP' enabled contain an authenticated remote code execution vulnerability. An authenticated attacker can create or run tools using Puppeteer/Playwright to specify malicious browser binary paths and parameters, escaping the nodevm sandbox and executing arbitrary code on the host system. This affects Flowise installations with the vulnerable configuration enabled.
💻 Affected Systems
- Flowise
📦 What is this software?
Flowise by Flowiseai
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the host machine, data exfiltration, lateral movement, and persistent backdoor installation.
Likely Case
Authenticated attackers with tool creation/execution privileges achieve remote code execution, potentially compromising sensitive data and system integrity.
If Mitigated
Limited impact if proper authentication controls, network segmentation, and monitoring are in place to detect and block exploitation attempts.
🎯 Exploit Status
Exploitation requires authenticated access with permissions to create/run tools. The vulnerability is well-documented in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v3.0.8
Vendor Advisory: https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-5w3r-f6gm-c25w
Restart Required: Yes
Instructions:
1. Update Flowise to version 3.0.8 or later. 2. Restart the Flowise service. 3. Verify the update was successful by checking the version.
🔧 Temporary Workarounds
Disable ALLOW_BUILTIN_DEP
allDisable the vulnerable configuration option that enables built-in dependencies
export ALLOW_BUILTIN_DEP=false
unset ALLOW_BUILTIN_DEP
Restrict Tool Creation Permissions
allLimit user permissions to prevent creation/execution of tools using Puppeteer/Playwright
🧯 If You Can't Patch
- Disable ALLOW_BUILTIN_DEP environment variable immediately
- Implement strict network segmentation and firewall rules to isolate Flowise instances
🔍 How to Verify
Check if Vulnerable:
Check Flowise version and verify if ALLOW_BUILTIN_DEP is enabled. Vulnerable if version is between 3.0.1-3.0.7 OR any version with ALLOW_BUILTIN_DEP=true.
Check Version:
Check Flowise UI dashboard or application logs for version information
Verify Fix Applied:
Confirm Flowise version is 3.0.8 or later and ALLOW_BUILTIN_DEP is disabled or not set.
📡 Detection & Monitoring
Log Indicators:
- Unusual tool execution patterns
- Puppeteer/Playwright executions with custom binary paths
- Authentication logs showing suspicious user activity
Network Indicators:
- Unexpected outbound connections from Flowise host
- Command and control traffic patterns
SIEM Query:
source="flowise" AND (event="tool_execution" OR event="puppeteer_exec" OR event="playwright_exec") AND (binary_path!="/usr/bin/chromium" OR binary_path!="/usr/bin/chrome")