CVE-2026-2097

8.8 HIGH

📋 TL;DR

Agentflow software by Flowring contains an arbitrary file upload vulnerability that allows authenticated attackers to upload malicious files and execute arbitrary code on the server. This affects all systems running vulnerable versions of Agentflow, potentially compromising the entire server environment.

💻 Affected Systems

Products:
  • Agentflow by Flowring
Versions: Specific versions not detailed in references; all versions before patch are likely affected
Operating Systems: All platforms running Agentflow
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but default configurations may be vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with persistent backdoor installation, data exfiltration, lateral movement to other systems, and ransomware deployment.

🟠

Likely Case

Web shell installation leading to data theft, credential harvesting, and use as pivot point for further attacks.

🟢

If Mitigated

Limited impact with proper file upload validation and execution restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references; check vendor advisory

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10700-3534d-2.html

Restart Required: Yes

Instructions:

1. Check vendor advisory for specific patch version
2. Download and apply the patch from Flowring
3. Restart Agentflow services
4. Verify file upload functionality is properly restricted

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure web server to only allow specific file extensions and validate file content

# Configure web server (e.g., Apache/Nginx) to block upload of executable files
# Example Nginx: location ~ \.(php|asp|aspx|jsp)$ { deny all; }

Implement File Upload Directory Restrictions

linux

Configure upload directory to prevent execution of uploaded files

# Linux: chmod -R 644 /path/to/uploads/
# Set directory to noexec: mount -o remount,noexec /path/to/uploads

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Agentflow servers
  • Deploy web application firewall with file upload filtering rules

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can upload files with executable extensions (.php, .asp, .jsp) and access them via web

Check Version:

Check Agentflow version in admin interface or configuration files

Verify Fix Applied:

Attempt to upload malicious file types and verify they are rejected or cannot be executed

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with executable extensions
  • Multiple failed upload attempts followed by successful upload
  • Access to uploaded files with suspicious names

Network Indicators:

  • HTTP POST requests to upload endpoints with executable file content
  • Subsequent requests to uploaded files with parameters

SIEM Query:

source="web_logs" AND (uri="*upload*" OR uri="*.php" OR uri="*.asp" OR uri="*.jsp") AND status=200

🔗 References

📤 Share & Export