Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Severe Vulnerability Exploited in Flowise AI Platform

Severe Vulnerability Exploited in Flowise AI Platform

Posted on April 7, 2026 By CWS

A major security flaw in the Flowise AI platform, an open-source application, is currently under exploitation by cybercriminals, as revealed by VulnCheck. Identified as CVE-2025-59528, this vulnerability has been assigned the maximum severity score of 10.0 under the Common Vulnerability Scoring System (CVSS).

Understanding the Vulnerability

The flaw, a code injection vulnerability, allows for remote code execution via the CustomMCP node. This node processes user inputs to configure connections to external servers using a string called mcpServerConfig. Unfortunately, Flowise’s advisory from September 2025 highlighted that this process executes JavaScript code without proper security checks.

When exploited, this vulnerability grants attackers access to critical Node.js modules like child_process and fs, enabling command execution and file system access. In essence, attackers can execute arbitrary JavaScript code, leading to complete system compromise and potential data breaches.

Security Implications and Responses

Flowise has emphasized the significant risk posed by this vulnerability, as it only requires an API token to exploit, threatening business operations and customer data. The issue was initially discovered and reported by Kim SooHyun and has since been addressed in version 3.0.6 of the npm package.

VulnCheck reported that the exploitation attempts are traced back to a single Starlink IP address. This vulnerability marks the third instance of a Flowise flaw being exploited in the wild, following CVE-2025-8943 and CVE-2025-26319, with CVSS scores of 9.8 and 8.9, respectively.

Wider Impact and Future Outlook

Caitlin Condon from VulnCheck described this as a critical-severity bug affecting a widely used AI platform by numerous large companies. Despite being publicly known for over six months, many instances remain vulnerable. The exposure of over 12,000 instances has expanded the attack surface significantly, making them attractive targets for opportunistic attackers.

As the situation unfolds, it is crucial for organizations using Flowise AI to ensure their systems are updated and patched promptly to mitigate potential risks. Continuous monitoring and proactive security measures are recommended to safeguard against future exploitation attempts.

The Hacker News Tags:AI platform, API token, CVE-2025-59528, Cybersecurity, data breach, Flowise AI, Kim SooHyun, Node.js, npm package, remote code execution, security flaw, Starlink IP, system compromise, VulnCheck, Vulnerability

Post navigation

Previous Post: Windows Defender Zero-Day Exploit Unveiled by Researcher
Next Post: Wynn Resorts Data Breach Affects Over 21,000 Employees

Related Posts

See Threats to Your Industry & Country in Real Time See Threats to Your Industry & Country in Real Time The Hacker News
CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution The Hacker News
Mitigating Risks of Exposed Endpoints in LLM Infrastructure Mitigating Risks of Exposed Endpoints in LLM Infrastructure The Hacker News
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet The Hacker News
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT The Hacker News
PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Bitcoin Depot Faces $3.6 Million Cyber Heist
  • Hackers Exploit Meta Business Manager for Phishing
  • Ceasefire Unlikely to Halt Iran-Linked Cyber Threats
  • AWS and Anthropic Enhance AI Cybersecurity with Claude Mythos
  • Anthropic’s Claude Mythos Preview Revolutionizes Zero-Day Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Bitcoin Depot Faces $3.6 Million Cyber Heist
  • Hackers Exploit Meta Business Manager for Phishing
  • Ceasefire Unlikely to Halt Iran-Linked Cyber Threats
  • AWS and Anthropic Enhance AI Cybersecurity with Claude Mythos
  • Anthropic’s Claude Mythos Preview Revolutionizes Zero-Day Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark