- Description
- Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- flowise
CVSS 3.1
- Type
- Secondary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- security-advisories@github.com
- CWE-94
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
22
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed (CVE-2025-59528) https://t.co/X1bT2724zF #appsec
@eyalestrin
8 Apr 2026
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution Intel Report: https://t.co/S2f5Uxi9lc
@cyberbivash
8 Apr 2026
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVSS 10 RCE vulnerability being exploited in Flowise. Info, incl. fix info, at vulnerability alert service, SecAlerts - CVE-2025-59528, CVSS 10: https://t.co/SWW2FgnGhp #ciso #cio #cto #vulnerabilities #cybersecurity #msp #mssp #secalerts #CVE202559528 #Flowise https://t.co/Yix
@SecAlertsCo
8 Apr 2026
118 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨 CVE-2025-59528 (CVSS 10.0) :RCE in FlowiseAI/Flowise. 🔥PoC:https://t.co/CoqRnXxhky 📊 34K+ Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/q2FFmybO8d 👇Query HUNTER : https://t.co/q9rtuGfZuz="Flowise" 📰Refer:https://t
@HunterMapping
8 Apr 2026
1136 Impressions
6 Retweets
17 Likes
4 Bookmarks
1 Reply
0 Quotes
攻撃者は、リモートコード実行のためにFlowiseの重大な脆弱性CVE-2025-59528を悪用する Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution #SecurityAffairs (Apr 7) https://t.co/7O9DRmQFcM
@foxbook
8 Apr 2026
247 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
TRC analysis shows attackers exploiting CVE-2025-59528 in Flowise's CustomMCP node to execute arbitrary JavaScript without validation. Post-compromise activity includes privilege escalation and lateral movement across AI development environments. Runtime segmentation helps
@aviatrixtrc
8 Apr 2026
83 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
TRC analysis shows attackers exploiting CVE-2025-59528 in Flowise AI to achieve full Node.js runtime access, then pivoting laterally through networks. Over 12,000 instances remain vulnerable to this critical RCE flaw. Runtime segmentation helps contain post-compromise lateral
@aviatrixtrc
7 Apr 2026
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BREACH ALERT WHO: Flowise WHAT: Maximum-severity remote code execution vulnerability (CVE-2025-59528) under active exploitation. HOW: Attackers can execute arbitrary code via improper configuration settings. Severity: Critical 🔴 Source " https://t.co/WPRiiGMqse #CyberSe
@UziSeclab2006
7 Apr 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BREACH ALERT WHO: Flowise (AI platform) WHAT: Critical remote code execution vulnerability (CVE-2025-59528) exploited actively. HOW: Code injection vulnerability exploiting user-provided configuration settings. Severity: Critical 🔴 Source " https://t.co/WPRiiGMqse #Cybe
@UziSeclab2006
7 Apr 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
BREAKING: Max severity Flowise RCE CVE-2025-59528 now under active exploitation, hackers executing arbitrary JS and OS commands on exposed CustomMCP nodes worldwide. https://t.co/5lDPa4YhaR
@threatcluster
7 Apr 2026
107 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution - https://t.co/KzEB3aylCD
@moton
7 Apr 2026
143 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Threat Alert: Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution 📅 Date: 2026-04-07 📆 Timeline: 2025-09-13 — Vulnerability disclosed; patch in Flowise 3.0.6. 2026-04-07 — VulnCheck detected first in‑the‑wild exploitation; ASM est
@syedaquib77
7 Apr 2026
124 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical #Flowise RCE Vulnerability (#CVE-2025-59528) Under Active Exploitation Threatens #AI Infrastructure + Video -Fact Checker: ✅: 2 ❌: 1 || 2/3 https://t.co/IKyuMkSQCu
@UndercodeNews
7 Apr 2026
107 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution https://t.co/kWEpU7SG95
@hackplayers
7 Apr 2026
530 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Flowise CVE-2025-59528 (CVSS 10) is being actively exploited - the CustomMCP node passes user input straight to Function() with full Node.js privileges. If you're running LLM workflow tools internet-facing, audit them now. https://t.co/pRHusTNJh1 #cybersecurity #infosec #LLM #RCE
@CyberDaily_News
7 Apr 2026
98 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📝 𝐌𝐚𝐱 𝐬𝐞𝐯𝐞𝐫𝐢𝐭𝐲 𝐅𝐥𝐨𝐰𝐢𝐬𝐞 𝐑𝐂𝐄 𝐯𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐧𝐨𝐰 𝐞𝐱𝐩𝐥𝐨𝐢𝐭𝐞𝐝 𝐢𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 • A maximum-severity vulnerability, CVE-20
@PurpleOps_io
7 Apr 2026
116 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical RCE vulnerability CVE-2025-59528 in Flowise’s CustomMCP node enables arbitrary JavaScript injection and command execution. Exploits detected from a Starlink IP. Update to Flowise 3.1.1 or higher. #FlowiseRCE #Starlink #USA https://t.co/8XOe59sAXC
@TweetThreatNews
7 Apr 2026
180 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[Security Affairs] Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution. Attackers are exploiting a critical Flowise flaw, tracked as CVE-2025-59528 (CVSS score of 10), that lets them run malicious code and access systems... https://t.co/FfZKBt4Knz
@shah_sheikh
7 Apr 2026
129 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution https://t.co/rSHnSD1WO0 #BreakingNews
@evanderburg
7 Apr 2026
151 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution: Attackers are exploiting a critical Flowise flaw, tracked as CVE-2025-59528 (CVSS score of 10), that lets them run malicious code and access systems due to poor validation… https://t.co/ANzdQwvd
@shah_sheikh
7 Apr 2026
109 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers are actively exploiting CVE-2025-59528, a maximum-severity remote code execution vulnerability in Flowise LLM platform. https://t.co/ywYt96gxVx
@Anavem_
7 Apr 2026
110 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers exploit critical #Flowise flaw CVE-2025-59528 for remote code execution https://t.co/uvnj9EES3x #securityaffairs #hacking
@securityaffairs
7 Apr 2026
322 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Flowise CVSS 10.0 RCE flaw now actively exploited; 12K–15K internet-exposed instances at risk Attackers are actively exploiting CVE-2025-59528 in Flowise, a max-severity JavaScript injection flaw allowing arbitrary code execution and full server compromise. Researchers observe
@VivekIntel
7 Apr 2026
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ **Vulnerability Alert:** Flowise — Critical RCE & related vulnerabilities (CVE-2025-59528, CVE-2025-8943, CVE-2025-26319) 📅 **Timeline:** Disclosure: 2025-03-04; Patch: 2025-09-15 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.224% 🆔
@syedaquib77
7 Apr 2026
117 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ **Vulnerability Alert:** Flowise — Multiple critical RCE and unsafe input handling vulnerabilities (CVE-2025-59528, CVE-2025-8943, CVE-2025-26319) 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-23 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) |
@syedaquib77
7 Apr 2026
137 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BREAKING: Hackers are exploiting a critical RCE vulnerability, CVE-2025-59528, in Flowise, an open-source platform for custom LLM apps. This flaw allows arbitrary code execution, posing significant risks. Stay vigilant! #CyberSecurity #BreakingNews https://t.co/Gl9dRu1CIW
@NewsNerdie
7 Apr 2026
116 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BREAKING: Hackers exploiting max-severity RCE vuln CVE-2025-59528 in Flowise LLM platform—arbitrary code exec, no auth needed! Patch NOW to 3.0.6. #CyberSecurity #InfoSec #Hacking https://t.co/5FJTNHrzDt
@Archange_Shadow
7 Apr 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Flowise’s max severity RCE flaw (CVE-2025-59528) is being actively exploited, allowing arbitrary code execution in open-source LLM apps and agentic systems. Learn more about the vulnerability and mitigation steps in our latest update: https://t.co/CQ94BTZln2
@trubetech
7 Apr 2026
114 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ **Vulnerability Alert:** Flowise Remote Code Execution via Unvalidated JavaScript (CVE-2025-59528) 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-15 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.224% 🛠️ **Exploit Maturity:** Ac
@syedaquib77
7 Apr 2026
124 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ ALERTA: La plataforma Flowise AI Agent Builder está siendo explotada activamente (CVE-2025-59528) con un CVSS de 10.0. Miles de instancias en riesgo. https://t.co/KtXpgvsRTA #CiberseguridadMX #RCE #CyberSecurity
@BotBauR
7 Apr 2026
121 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Flowise — an open-source AI platform used by thousands of developers — has a CVSS 10.0 vulnerability being actively exploited right now. CVE-2025-59528. The CustomMCP node lets users input config for connecting to external MCP servers. It parses the config string by executing
@CinderSecurity
7 Apr 2026
62 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️ Cyber Byte #2 Flowise RCE Still Being Exploited CVE-2025-59528 (CVSS 10) — one valid API token gives full server takeover in Flowise < 3.0.6. 12,000+ instances exposed. Update to 3.0.6+ right now. #CyberSecurity #AISecurity #ZeroDay #RCE
@CyberBriefDaily
7 Apr 2026
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Threat Alert: Flowise RCE (CVE-2025-59528) Exploitation 📅 Date: 2026-04-07 (active exploitation reported); CVE published 2025-09-22 📆 Timeline: 2025-09-22: CVE-2025-59528 published (NVD/GitHub CNA). Fix committed and released as Flowise 3.0.6. 2026-04-07: multiple
@syedaquib77
7 Apr 2026
121 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
BREAKING: Critical Flowise AI RCE bug CVE-2025-59528 actively exploited, 15,000+ exposed instances allow arbitrary JavaScript execution and full server takeover. https://t.co/YE4DKwxsj7
@threatcluster
7 Apr 2026
116 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat actors are actively exploiting CVE-2025-59528, a maximum-severity (CVSS 10.0) code injection flaw in the popular open-source AI platform Flowise. https://t.co/wN1LJDyVMo #CyberSecurity #Flowise #RCE #Vulnerability #CVE #OpenSourceSecurity #InfoSec #Exploit #AI https://t.
@redsecuretech
7 Apr 2026
105 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
⚠️ Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to new findings from VulnCheck. The vulnerability in question is CVE-2025-59528 (CVSS score: 10.0), a code injection vulnerability that
@v_x1_s
7 Apr 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Vulnerability Alert — Flowise CVE-2025-59528 (CVSS 10.0) is being actively exploited in Flowise. The flaw allows remote code execution and could lead to full system compromise. Over 12,000 internet-exposed instances may be at risk. Update to Flowise 3.0.6 immediately. https://
@CloneSystemsInc
7 Apr 2026
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ **Vulnerability Alert:** Flowise AI Critical Vulnerability (CVE-2025-59528) - Consolidated Alert 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-23 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.252% 🛠️ **Exploit Maturity:** Acti
@syedaquib77
7 Apr 2026
117 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ **Vulnerability Alert:** Flowise AI Critical Vulnerability (CVE-2025-59528) - Active Exploitation 📅 **Timeline:** Disclosure: unknown, Patch: unknown 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (Critical 🔴) | 📈 EPSS: 99.252% 🛠️ **Exploit Maturity:** Actively
@syedaquib77
7 Apr 2026
111 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ **Vulnerability Alert:** Critical Flowise AI Vulnerability (CVE-2025-59528) 📅 **Timeline:** Disclosure: 2025-09-22, Patch: 2025-09-23 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (CRITICAL 🔴) | 📈 EPSS: 99.25% 🛠️ **Exploit Maturity:** Actively Exploited 📂 **
@syedaquib77
7 Apr 2026
106 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 Flowise CVE-2025-59528 (CVSS 10) is actively exploited. Patch now. 🔴 Storm-1175 linked to zero-day exploitation in Medusa operations. Tighten exposure and patch SLAs. https://t.co/pBWq66uIkZ
@solomonneas
7 Apr 2026
108 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Flowise flaw under active exploitation CVE-2025-59528 is a critical CVSS 10.0 RCE vulnerability affecting Flowise AI Agent Builder, with 12,000+ exposed instances at risk. https://t.co/WvxqZFUCCw #Flowise #CVE202559528 #CyberSecurity #Vulert
@vulert_official
7 Apr 2026
94 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Flowise AI Platform Under Active RCE Attack A critical vulnerability in the Flowise AI agent builder (CVE-2025-59528, CVSS 10.0) is being actively exploited in the wild. This open-source platform, used to build AI workflows, has over 12,000 exposed instances. The flaw all
@xhackio
7 Apr 2026
75 Impressions
1 Retweet
1 Like
0 Bookmarks
1 Reply
0 Quotes
🚨 Threat Alert: Flowise Code Injection Exploitation (CVE-2025-59528) 📅 Date: 2026-04-07 📆 Timeline: 2025-09-22: NVD entry recorded for CVE-2025-59528. | Flowise released patched version 3.0.6 (patches CustomMCP evaluation). | 2026-03-06: exploit artifacts reported avai
@syedaquib77
7 Apr 2026
106 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
脅威アクターがオープンソースのAIプラットフォーム「Flowise」の最大深刻度のセキュリティ脆弱性を悪用していることが判明した。この脆弱性はCVE-2025-59528として特定されており、コードインジェクションを
@yousukezan
7 Apr 2026
871 Impressions
2 Retweets
3 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 CRITICAL: #Flowise #CVE-2025-59528 (CVSS 100) Under Active Attack – Full System RCE via API Token + Video https://t.co/vechOi32TR Educational Purposes!
@UndercodeUpdate
7 Apr 2026
118 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Flowise AI platform hit by actively exploited CVSS 10.0 RCE (CVE-2025-59528), allowing arbitrary JavaScript execution and full server compromise, with 12,000+ internet-exposed instances at risk. https://t.co/tfaEhfCTB3
@VivekIntel
7 Apr 2026
122 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ **Vulnerability Alert:** Flowise CustomMCP Node Code Injection Leading to Remote Code Execution (CVE-2025-59528) 📅 **Timeline:** Disclosure: 2025-09-13, Patch: 2025-09-22 📌 **Attribution:** im-soohyun / Kim SooHyun 🆔 **CVE-2025-59528** | 📊 CVSS: 10.0 (Critical
@syedaquib77
7 Apr 2026
157 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 BREAKING: A critical CVSS 10.0 RCE flaw in Flowise AI Agent Builder is under active exploitation, exposing over 12,000 instances. VulnCheck warns of severe risks due to CVE-2025-59528 vulnerability. Immediate action recommended. #CyberSecurity #BreakingNews https://t.co/JIqJ
@NewsNerdie
7 Apr 2026
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛑 Flowise has a CVSS 10.0 RCE flaw (CVE-2025-59528) now under active attack. A bug in MCP config lets attackers run JavaScript with full system access using just an API token. Over 12,000 exposed instances raise risk. 🔗 Exploitation details → https://t.co/deyWrSzSLX
@TheHackersNews
7 Apr 2026
10028 Impressions
33 Retweets
78 Likes
17 Bookmarks
5 Replies
4 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flowiseai:flowise:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D151AD-7484-4BE3-B42F-7D0279B5E886",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]