CVE-2025-67750

8.4 HIGH

📋 TL;DR

CVE-2025-67750 is a remote code execution vulnerability in Lightning Flow Scanner where maliciously crafted flow metadata files can execute arbitrary JavaScript during scanning. The vulnerability affects developers using the CLI plugin, VS Code Extension, or GitHub Action versions 6.10.5 and below, potentially compromising developer machines, CI runners, or editor environments.

💻 Affected Systems

Products:
  • Lightning Flow Scanner CLI plugin
  • Lightning Flow Scanner VS Code Extension
  • Lightning Flow Scanner GitHub Action
Versions: 6.10.5 and below
Operating Systems: All platforms where these tools run
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when scanning flow metadata files, particularly through the APIVersion rule evaluation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of developer workstations or CI/CD infrastructure leading to data theft, lateral movement, and supply chain attacks.

🟠

Likely Case

Malicious code execution on developer machines scanning untrusted flow metadata, potentially stealing credentials or sensitive data.

🟢

If Mitigated

Limited impact if scanning only trusted metadata sources with proper network segmentation and least privilege.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the victim to scan a malicious flow metadata file, which could be delivered via repositories, shared files, or CI/CD pipelines.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.10.6

Vendor Advisory: https://github.com/Flow-Scanner/lightning-flow-scanner/security/advisories/GHSA-55jh-84jv-8mx8

Restart Required: No

Instructions:

1. Update Lightning Flow Scanner to version 6.10.6 or higher. 2. For CLI: npm update @flowscanner/cli. 3. For VS Code: Update extension via marketplace. 4. For GitHub Action: Update workflow to use core-v6.10.6 or later.

🔧 Temporary Workarounds

Disable APIVersion rule

all

Temporarily disable the vulnerable rule that uses new Function() evaluation

Add 'APIVersion' to disabledRules in scanner configuration

Scan only trusted sources

all

Restrict scanning to verified, trusted flow metadata files

🧯 If You Can't Patch

  • Isolate scanning environments with network segmentation and minimal privileges
  • Implement strict source control policies to prevent untrusted flow metadata

🔍 How to Verify

Check if Vulnerable:

Check current version: For CLI run 'flow-scanner --version', for VS Code check extension version, for GitHub Action check workflow YAML.

Check Version:

flow-scanner --version

Verify Fix Applied:

Confirm version is 6.10.6 or higher using the same commands.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected JavaScript execution errors in scanner logs
  • Unusual process creation during flow scanning

Network Indicators:

  • Unexpected outbound connections from scanning environments

SIEM Query:

Process creation where parent process contains 'flow-scanner' AND command line contains suspicious JavaScript patterns

🔗 References

📤 Share & Export