CVE-2025-59528

Published Sep 22, 2025

Last updated 7 months ago

CVSS critical 10.0
Flowise
Node.js

Overview

Description
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.
Source
security-advisories@github.com
NVD status
Analyzed
Products
flowise

Risk scores

CVSS 3.1

Type
Secondary
Base score
10
Impact score
6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-94

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

22

  1. Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed (CVE-2025-59528) https://t.co/X1bT2724zF #appsec

    @eyalestrin

    8 Apr 2026

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution Intel Report: https://t.co/S2f5Uxi9lc

    @cyberbivash

    8 Apr 2026

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. CVSS 10 RCE vulnerability being exploited in Flowise. Info, incl. fix info, at vulnerability alert service, SecAlerts - CVE-2025-59528, CVSS 10: https://t.co/SWW2FgnGhp #ciso #cio #cto #vulnerabilities #cybersecurity #msp #mssp #secalerts #CVE202559528 #Flowise https://t.co/Yix

    @SecAlertsCo

    8 Apr 2026

    118 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨Alert🚨 CVE-2025-59528 (CVSS 10.0) :RCE in FlowiseAI/Flowise. 🔥PoC:https://t.co/CoqRnXxhky 📊 34K+ Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/q2FFmybO8d 👇Query HUNTER : https://t.co/q9rtuGfZuz="Flowise" 📰Refer:https://t

    @HunterMapping

    8 Apr 2026

    1136 Impressions

    6 Retweets

    17 Likes

    4 Bookmarks

    1 Reply

    0 Quotes

  5. 攻撃者は、リモートコード実行のためにFlowiseの重大な脆弱性CVE-2025-59528を悪用する Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution #SecurityAffairs (Apr 7) https://t.co/7O9DRmQFcM

    @foxbook

    8 Apr 2026

    247 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  6. TRC analysis shows attackers exploiting CVE-2025-59528 in Flowise's CustomMCP node to execute arbitrary JavaScript without validation. Post-compromise activity includes privilege escalation and lateral movement across AI development environments. Runtime segmentation helps

    @aviatrixtrc

    8 Apr 2026

    83 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. TRC analysis shows attackers exploiting CVE-2025-59528 in Flowise AI to achieve full Node.js runtime access, then pivoting laterally through networks. Over 12,000 instances remain vulnerable to this critical RCE flaw. Runtime segmentation helps contain post-compromise lateral

    @aviatrixtrc

    7 Apr 2026

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. 🚨 BREACH ALERT WHO: Flowise WHAT: Maximum-severity remote code execution vulnerability (CVE-2025-59528) under active exploitation. HOW: Attackers can execute arbitrary code via improper configuration settings. Severity: Critical 🔴 Source " https://t.co/WPRiiGMqse #CyberSe

    @UziSeclab2006

    7 Apr 2026

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 🚨 BREACH ALERT WHO: Flowise (AI platform) WHAT: Critical remote code execution vulnerability (CVE-2025-59528) exploited actively. HOW: Code injection vulnerability exploiting user-provided configuration settings. Severity: Critical 🔴 Source " https://t.co/WPRiiGMqse #Cybe

    @UziSeclab2006

    7 Apr 2026

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. BREAKING: Max severity Flowise RCE CVE-2025-59528 now under active exploitation, hackers executing arbitrary JS and OS commands on exposed CustomMCP nodes worldwide. https://t.co/5lDPa4YhaR

    @threatcluster

    7 Apr 2026

    107 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  11. Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution - https://t.co/KzEB3aylCD

    @moton

    7 Apr 2026

    143 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 🚨 Threat Alert: Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution 📅 Date: 2026-04-07 📆 Timeline: 2025-09-13 — Vulnerability disclosed; patch in Flowise 3.0.6. 2026-04-07 — VulnCheck detected first in‑the‑wild exploitation; ASM est

    @syedaquib77

    7 Apr 2026

    124 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🚨 Critical #Flowise RCE Vulnerability (#CVE-2025-59528) Under Active Exploitation Threatens #AI Infrastructure + Video -Fact Checker: ✅: 2 ❌: 1 || 2/3 https://t.co/IKyuMkSQCu

    @UndercodeNews

    7 Apr 2026

    107 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution https://t.co/kWEpU7SG95

    @hackplayers

    7 Apr 2026

    530 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Flowise CVE-2025-59528 (CVSS 10) is being actively exploited - the CustomMCP node passes user input straight to Function() with full Node.js privileges. If you're running LLM workflow tools internet-facing, audit them now. https://t.co/pRHusTNJh1 #cybersecurity #infosec #LLM #RCE

    @CyberDaily_News

    7 Apr 2026

    98 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. 📝 𝐌𝐚𝐱 𝐬𝐞𝐯𝐞𝐫𝐢𝐭𝐲 𝐅𝐥𝐨𝐰𝐢𝐬𝐞 𝐑𝐂𝐄 𝐯𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐧𝐨𝐰 𝐞𝐱𝐩𝐥𝐨𝐢𝐭𝐞𝐝 𝐢𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 • A maximum-severity vulnerability, CVE-20

    @PurpleOps_io

    7 Apr 2026

    116 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. A critical RCE vulnerability CVE-2025-59528 in Flowise’s CustomMCP node enables arbitrary JavaScript injection and command execution. Exploits detected from a Starlink IP. Update to Flowise 3.1.1 or higher. #FlowiseRCE #Starlink #USA https://t.co/8XOe59sAXC

    @TweetThreatNews

    7 Apr 2026

    180 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. [Security Affairs] Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution. Attackers are exploiting a critical Flowise flaw, tracked as CVE-2025-59528 (CVSS score of 10), that lets them run malicious code and access systems... https://t.co/FfZKBt4Knz

    @shah_sheikh

    7 Apr 2026

    129 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution https://t.co/rSHnSD1WO0 #BreakingNews

    @evanderburg

    7 Apr 2026

    151 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution: Attackers are exploiting a critical Flowise flaw, tracked as CVE-2025-59528 (CVSS score of 10), that lets them run malicious code and access systems due to poor validation… https://t.co/ANzdQwvd

    @shah_sheikh

    7 Apr 2026

    109 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Attackers are actively exploiting CVE-2025-59528, a maximum-severity remote code execution vulnerability in Flowise LLM platform. https://t.co/ywYt96gxVx

    @Anavem_

    7 Apr 2026

    110 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. Attackers exploit critical #Flowise flaw CVE-2025-59528 for remote code execution https://t.co/uvnj9EES3x #securityaffairs #hacking

    @securityaffairs

    7 Apr 2026

    322 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. Flowise CVSS 10.0 RCE flaw now actively exploited; 12K–15K internet-exposed instances at risk Attackers are actively exploiting CVE-2025-59528 in Flowise, a max-severity JavaScript injection flaw allowing arbitrary code execution and full server compromise. Researchers observe

    @VivekIntel

    7 Apr 2026

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. ⚠️ **Vulnerability Alert:** Flowise — Critical RCE & related vulnerabilities (CVE-2025-59528, CVE-2025-8943, CVE-2025-26319) 📅 **Timeline:** Disclosure: 2025-03-04; Patch: 2025-09-15 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.224% 🆔

    @syedaquib77

    7 Apr 2026

    117 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. ⚠️ **Vulnerability Alert:** Flowise — Multiple critical RCE and unsafe input handling vulnerabilities (CVE-2025-59528, CVE-2025-8943, CVE-2025-26319) 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-23 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) |

    @syedaquib77

    7 Apr 2026

    137 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. 🚨 BREAKING: Hackers are exploiting a critical RCE vulnerability, CVE-2025-59528, in Flowise, an open-source platform for custom LLM apps. This flaw allows arbitrary code execution, posing significant risks. Stay vigilant! #CyberSecurity #BreakingNews https://t.co/Gl9dRu1CIW

    @NewsNerdie

    7 Apr 2026

    116 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨 BREAKING: Hackers exploiting max-severity RCE vuln CVE-2025-59528 in Flowise LLM platform—arbitrary code exec, no auth needed! Patch NOW to 3.0.6. #CyberSecurity #InfoSec #Hacking https://t.co/5FJTNHrzDt

    @Archange_Shadow

    7 Apr 2026

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Flowise’s max severity RCE flaw (CVE-2025-59528) is being actively exploited, allowing arbitrary code execution in open-source LLM apps and agentic systems. Learn more about the vulnerability and mitigation steps in our latest update: https://t.co/CQ94BTZln2

    @trubetech

    7 Apr 2026

    114 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. ⚠️ **Vulnerability Alert:** Flowise Remote Code Execution via Unvalidated JavaScript (CVE-2025-59528) 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-15 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.224% 🛠️ **Exploit Maturity:** Ac

    @syedaquib77

    7 Apr 2026

    124 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. ⚠️ ALERTA: La plataforma Flowise AI Agent Builder está siendo explotada activamente (CVE-2025-59528) con un CVSS de 10.0. Miles de instancias en riesgo. https://t.co/KtXpgvsRTA #CiberseguridadMX #RCE #CyberSecurity

    @BotBauR

    7 Apr 2026

    121 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  31. Flowise — an open-source AI platform used by thousands of developers — has a CVSS 10.0 vulnerability being actively exploited right now. CVE-2025-59528. The CustomMCP node lets users input config for connecting to external MCP servers. It parses the config string by executing

    @CinderSecurity

    7 Apr 2026

    62 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🛡️ Cyber Byte #2 Flowise RCE Still Being Exploited CVE-2025-59528 (CVSS 10) — one valid API token gives full server takeover in Flowise < 3.0.6. 12,000+ instances exposed. Update to 3.0.6+ right now. #CyberSecurity #AISecurity #ZeroDay #RCE

    @CyberBriefDaily

    7 Apr 2026

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🚨 Threat Alert: Flowise RCE (CVE-2025-59528) Exploitation 📅 Date: 2026-04-07 (active exploitation reported); CVE published 2025-09-22 📆 Timeline: 2025-09-22: CVE-2025-59528 published (NVD/GitHub CNA). Fix committed and released as Flowise 3.0.6. 2026-04-07: multiple

    @syedaquib77

    7 Apr 2026

    121 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. BREAKING: Critical Flowise AI RCE bug CVE-2025-59528 actively exploited, 15,000+ exposed instances allow arbitrary JavaScript execution and full server takeover. https://t.co/YE4DKwxsj7

    @threatcluster

    7 Apr 2026

    116 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. Threat actors are actively exploiting CVE-2025-59528, a maximum-severity (CVSS 10.0) code injection flaw in the popular open-source AI platform Flowise. https://t.co/wN1LJDyVMo #CyberSecurity #Flowise #RCE #Vulnerability #CVE #OpenSourceSecurity #InfoSec #Exploit #AI https://t.

    @redsecuretech

    7 Apr 2026

    105 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  36. ⚠️ Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that

    @v_x1_s

    7 Apr 2026

    56 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. Vulnerability Alert — Flowise CVE-2025-59528 (CVSS 10.0) is being actively exploited in Flowise. The flaw allows remote code execution and could lead to full system compromise. Over 12,000 internet-exposed instances may be at risk. Update to Flowise 3.0.6 immediately. https://

    @CloneSystemsInc

    7 Apr 2026

    78 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. ⚠️ **Vulnerability Alert:** Flowise AI Critical Vulnerability (CVE-2025-59528) - Consolidated Alert 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-23 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.252% 🛠️ **Exploit Maturity:** Acti

    @syedaquib77

    7 Apr 2026

    117 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. ⚠️ **Vulnerability Alert:** Flowise AI Critical Vulnerability (CVE-2025-59528) - Active Exploitation 📅 **Timeline:** Disclosure: unknown, Patch: unknown 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (Critical 🔴) | 📈 EPSS: 99.252% 🛠️ **Exploit Maturity:** Actively

    @syedaquib77

    7 Apr 2026

    111 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. ⚠️ **Vulnerability Alert:** Critical Flowise AI Vulnerability (CVE-2025-59528) 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-23 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.25% 🛠️ **Exploit Maturity:** Actively Exploited 📂 **

    @syedaquib77

    7 Apr 2026

    106 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. 🔴 Flowise CVE-2025-59528 (CVSS 10) is actively exploited. Patch now. 🔴 Storm-1175 linked to zero-day exploitation in Medusa operations. Tighten exposure and patch SLAs. https://t.co/pBWq66uIkZ

    @solomonneas

    7 Apr 2026

    108 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. 🚨 Flowise flaw under active exploitation CVE-2025-59528 is a critical CVSS 10.0 RCE vulnerability affecting Flowise AI Agent Builder, with 12,000+ exposed instances at risk. https://t.co/WvxqZFUCCw #Flowise #CVE202559528 #CyberSecurity #Vulert

    @vulert_official

    7 Apr 2026

    94 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. ⚠️ Flowise AI Platform Under Active RCE Attack A critical vulnerability in the Flowise AI agent builder (CVE-2025-59528, CVSS 10.0) is being actively exploited in the wild. This open-source platform, used to build AI workflows, has over 12,000 exposed instances. The flaw all

    @xhackio

    7 Apr 2026

    75 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  44. 🚨 Threat Alert: Flowise Code Injection Exploitation (CVE-2025-59528) 📅 Date: 2026-04-07 📆 Timeline: 2025-09-22: NVD entry recorded for CVE-2025-59528. | Flowise released patched version 3.0.6 (patches CustomMCP evaluation). | 2026-03-06: exploit artifacts reported avai

    @syedaquib77

    7 Apr 2026

    106 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. 脅威アクターがオープンソースのAIプラットフォーム「Flowise」の最大深刻度のセキュリティ脆弱性を悪用していることが判明した。この脆弱性はCVE-2025-59528として特定されており、コードインジェクションを

    @yousukezan

    7 Apr 2026

    871 Impressions

    2 Retweets

    3 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  46. 🚨 CRITICAL: #Flowise #CVE-2025-59528 (CVSS 100) Under Active Attack – Full System RCE via API Token + Video https://t.co/vechOi32TR Educational Purposes!

    @UndercodeUpdate

    7 Apr 2026

    118 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Flowise AI platform hit by actively exploited CVSS 10.0 RCE (CVE-2025-59528), allowing arbitrary JavaScript execution and full server compromise, with 12,000+ internet-exposed instances at risk. https://t.co/tfaEhfCTB3

    @VivekIntel

    7 Apr 2026

    122 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. ⚠️ **Vulnerability Alert:** Flowise CustomMCP Node Code Injection Leading to Remote Code Execution (CVE-2025-59528) 📅 **Timeline:** Disclosure: 2025-09-13, Patch: 2025-09-22 📌 **Attribution:** im-soohyun / Kim SooHyun 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (Critical

    @syedaquib77

    7 Apr 2026

    157 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. 🚨 BREAKING: A critical CVSS 10.0 RCE flaw in Flowise AI Agent Builder is under active exploitation, exposing over 12,000 instances. VulnCheck warns of severe risks due to CVE-2025-59528 vulnerability. Immediate action recommended. #CyberSecurity #BreakingNews https://t.co/JIqJ

    @NewsNerdie

    7 Apr 2026

    96 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. 🛑 Flowise has a CVSS 10.0 RCE flaw (CVE-2025-59528) now under active attack. A bug in MCP config lets attackers run JavaScript with full system access using just an API token. Over 12,000 exposed instances raise risk. 🔗 Exploitation details → https://t.co/deyWrSzSLX

    @TheHackersNews

    7 Apr 2026

    10028 Impressions

    33 Retweets

    78 Likes

    17 Bookmarks

    5 Replies

    4 Quotes

Configurations