CVE-2025-59528

CRITICAL EXPLOITED NUCLEI

Flowise < 3.0.6 - Code Injection

Title source: rule

Description

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.

Exploits (11)

exploitdb WORKING POC
by nltt0 · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52440
nomisec WRITEUP 9 stars
by secopssite · poc
https://github.com/secopssite/HTB
nomisec WORKING POC
by danhle5402 · remote-auth
https://github.com/danhle5402/CVE-2025-59528
nomisec WORKING POC
by r3nsi15 · remote-auth
https://github.com/r3nsi15/Flowise-RCE-CVE-2025-59528
nomisec WORKING POC
by maradonam18 · remote-auth
https://github.com/maradonam18/-CVE-2025-59528-PoC
nomisec WORKING POC
by vanhari · remote
https://github.com/vanhari/CVE-2025-59528
nomisec WORKING POC
by UsifAraby · remote-auth
https://github.com/UsifAraby/CVE-2025-59528-POC
vulncheck_xdb WORKING POC
remote
https://github.com/TYehan/CVE-2025-58434-59528
vulncheck_xdb WORKING POC
remote
https://github.com/CVETeam/FlowiseAI-Critical-KillChain
vulncheck_xdb WORKING POC
remote
https://github.com/kartik2005221/CVE-2025-58434-AND-59528-POC
metasploit WORKING POC EXCELLENT
by Kim SooHyun (im-soohyun), nltt0 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/flowise_js_rce.rb

Nuclei Templates (1)

Flowise - Remote Code Execution
CRITICALVERIFIEDby xtr0nix

Scores

CVSS v3 10.0
EPSS 0.8354
EPSS Percentile 99.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

VulnCheck KEV 2026-04-05
CWE
CWE-94
Status published
Products (2)
flowiseai/flowise 3.0.5
npm/flowise 3.0.5 - 3.0.6npm
Published Sep 22, 2025
Tracked Since Feb 18, 2026