Flowise AI Platform Under Active Attack: 12,000+ Instances Exposed to Maximum-Severity Vulnerability
What's Happening?
Security researchers at VulnCheck have confirmed that malicious actors are actively exploiting a critical vulnerability in Flowise, a popular open-source platform used to build AI agents and workflows. The flaw carries the highest possible severity rating, a CVSS score of 10.0, meaning it requires no special privileges to exploit and can result in complete system compromise.
The Vulnerability: CVE-2025-59528
The flaw, tracked as CVE-2025-59528, is a code injection vulnerability residing in Flowise's CustomMCP node, a component that lets users configure connections to external Model Context Protocol (MCP) servers. The problem lies in how the node processes user-provided configuration strings: it executes JavaScript code embedded in those strings without any security validation whatsoever.
Because Flowise runs with full Node.js runtime privileges, a successful attacker gains access to powerful system modules including:
- child_process — enabling arbitrary command execution
- fs — enabling full file system access
In practical terms, an attacker who weaponizes this flaw can execute any code on the target server, steal sensitive data, access the file system, or cause complete system takeover. Only a valid API token is required to launch the attack, making this an extreme risk to business operations and customer data.
The vulnerability was discovered and responsibly disclosed by Kim SooHyun, and was patched in version 3.0.6 of the Flowise npm package. An advisory was first published back in September 2025.
Active Exploitation in the Wild
Despite being public for over six months, the vulnerability is now being actively weaponized. According to VulnCheck, exploitation attempts have been traced back to a single Starlink IP address, suggesting opportunistic scanning and targeting of exposed instances.
This is not the first time Flowise has been targeted. CVE-2025-59528 is actually the third Flowise vulnerability with confirmed in-the-wild exploitation, following:
- CVE-2025-8943 (CVSS 9.8) — remote OS command execution
- CVE-2025-26319 (CVSS 8.9) — arbitrary file upload
The Scale of Exposure
What makes this situation particularly alarming is the sheer number of exposed targets. VulnCheck estimates that over 12,000 Flowise instances are publicly accessible on the internet. Caitlin Condon, VP of Security Research at VulnCheck, described the situation clearly:
This is a critical bug in a popular AI platform used by a number of large corporations. The internet-facing attack surface of 12,000+ exposed instances makes the active exploitation attempts we're seeing much more serious, attackers have plenty of targets to opportunistically reconnoiter and exploit.
What Should You Do?
If you or your organization is running Flowise, the steps are straightforward:
- Update immediately to version 3.0.6 or later of the Flowise npm package
- Audit your deployment, check whether your Flowise instance is publicly accessible
- Review API token access and restrict it to trusted sources only
- Monitor for suspicious activity, especially unusual outbound connections or file system changes
Key Takeaway
The Flowise incident is a stark reminder that AI development tools are becoming prime targets for cyberattacks. As these platforms grow in adoption across enterprises, their security posture becomes just as critical as the AI models they help build. Leaving known, patched vulnerabilities unaddressed, especially ones this severe, is an unacceptable risk.
Comments
Post a Comment