CVE-2025-8943
CRITICAL EXPLOITED NUCLEIFlowise < 3.0.1 - Missing Authorization
Title source: ruleDescription
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
by Assaf Levkovich · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/flowise_custommcp_rce.rb
Nuclei Templates (1)
Flowise < 3.0.1 - Remote Command Execution
CRITICALVERIFIEDby zezezez
Shodan:
http.title:"Flowise"
Scores
CVSS v3
9.8
EPSS
0.8469
EPSS Percentile
99.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-11-27
CWE
CWE-862
CWE-306
Status
published
Products (2)
flowiseai/flowise
< 3.0.1
npm/flowise
0npm
Published
Aug 14, 2025
Tracked Since
Feb 18, 2026