CVE-2025-59528

10.0 CRITICAL

📋 TL;DR

Flowise versions 3.0.5 and below contain a critical remote code execution vulnerability in the CustomMCP node. Attackers can execute arbitrary JavaScript code with full Node.js privileges by manipulating the mcpServerConfig parameter, potentially gaining complete control of affected systems. All Flowise deployments using vulnerable versions are affected.

💻 Affected Systems

Products:
  • Flowise
Versions: 3.0.5 and earlier
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Any deployment using the CustomMCP node feature is vulnerable. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, access sensitive data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to data theft, service disruption, and unauthorized access to the underlying server and connected systems.

🟢

If Mitigated

Limited impact through network segmentation and strict input validation, though risk remains if vulnerable code is accessible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and exploitation is straightforward via crafted input to the mcpServerConfig parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.6

Vendor Advisory: https://github.com/FlowiseAI/Flowise/security/advisories

Restart Required: Yes

Instructions:

1. Stop the Flowise service. 2. Update Flowise to version 3.0.6 or later using npm update or package manager. 3. Restart the Flowise service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable CustomMCP Node

all

Remove or disable access to the vulnerable CustomMCP node functionality

Modify Flowise configuration to disable MCP nodes or restrict access

Network Isolation

all

Restrict network access to Flowise instances

Configure firewall rules to limit access to trusted IPs only

🧯 If You Can't Patch

  • Immediately isolate affected systems from the internet and sensitive networks
  • Implement strict input validation and sanitization for all user-provided configuration data

🔍 How to Verify

Check if Vulnerable:

Check Flowise version in package.json or via npm list flowise. Versions <=3.0.5 are vulnerable.

Check Version:

npm list flowise | grep flowise

Verify Fix Applied:

Confirm version is 3.0.6 or later and test that malicious input to mcpServerConfig parameter is properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution patterns
  • Suspicious child_process or fs module usage
  • Abnormal MCP server configuration attempts

Network Indicators:

  • Unexpected outbound connections from Flowise server
  • Suspicious payloads in HTTP requests to Flowise API endpoints

SIEM Query:

source="flowise" AND (mcpServerConfig CONTAINS "Function" OR mcpServerConfig CONTAINS "child_process" OR mcpServerConfig CONTAINS "fs")

🔗 References

📤 Share & Export