Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flowise AI Vulnerability Exploited in Cyber Attacks

Critical Flowise AI Vulnerability Exploited in Cyber Attacks

Posted on April 7, 2026 By CWS

Cybersecurity experts are sounding the alarm over a severe remote code execution (RCE) vulnerability in Flowise, an open-source platform used to create AI agents and tailor large language model workflows. This critical issue, identified as CVE-2025-59528 and carrying a maximum CVSS score of 10.0, allows perpetrators to run arbitrary JavaScript code, potentially compromising entire systems.

Widespread Exposure and Exploitation

According to threat intelligence data, an estimated 12,000 to 15,000 instances of Flowise are currently accessible via the public internet. This extensive exposure presents a significant opportunity for malicious actors to exploit the vulnerability. The flaw originates from inadequate input validation within Flowise’s CustomMCP node, which manages configuration settings for external Model Context Protocol (MCP) servers.

Instead of securely parsing incoming data, the platform’s convertToValidJSONString function passes the user-supplied mcpServerConfig string directly to a Function() constructor. This oversight allows the input to be executed as JavaScript code within the global Node.js context, enabling attackers to deploy harmful payloads with unrestricted runtime privileges.

Technical Exploitation Details

Exploiting CVE-2025-59528 is alarmingly straightforward, requiring no user interaction. Attackers simply send a specially crafted HTTP POST request to the application’s API endpoint over the network. Once the payload triggers the vulnerable constructor, it leverages core Node.js modules like child_process to execute system-level commands.

The repercussions are severe, granting attackers full system access, enabling them to navigate the file system and extract sensitive corporate data. A publicly available proof-of-concept exploit highlights how attackers can easily harness this vulnerability using basic command-line utilities. By embedding a payload that invokes system modules, attackers can manipulate the server to perform remote commands, including writing arbitrary files to temporary storage.

Cybersecurity Community Response

In April 2026, VulnCheck security researchers recorded the first known exploitation of this vulnerability in real-world scenarios, with initial attacks traced back to a Starlink IP address. The flaw is garnering considerable attention within the cybersecurity field due to the sheer number of exposed systems and the simplicity of the exploit.

This incident is part of a broader trend of targeted attacks on AI infrastructure, following previous exploits of other Flowise vulnerabilities. Versions of Flowise up to 3.0.5 remain susceptible to this critical code injection issue, which has been rectified in version 3.0.6 through enhanced security validation of MCP server configurations. Organizations utilizing Flowise are urged to upgrade to the latest version and restrict public network exposure of their application APIs to mitigate risk.

Stay informed with the latest cybersecurity news by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:AI vulnerability, CVE-2025-59528, cyber attacks, Cybersecurity, data breach, Exploit, Flowise, network security, Node.js, remote code execution, security patch, Software Security, software update, system compromise, VulnCheck

Post navigation

Previous Post: New GPU Rowhammer Exploit Threatens Cloud Security
Next Post: Secure Identity Gaps Before 2026 AI Exploits Risk

Related Posts

Splunk Resolves Vulnerabilities Exposing Data and Causing DoS Splunk Resolves Vulnerabilities Exposing Data and Causing DoS Cyber Security News
Cisco Firewall Vulnerability Used for Ransomware Attacks Cisco Firewall Vulnerability Used for Ransomware Attacks Cyber Security News
10 Best Bot Protection Software 10 Best Bot Protection Software Cyber Security News
Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Cyber Security News
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 Cyber Security News
TencShell Malware Threatens Cybersecurity with Advanced Capabilities TencShell Malware Threatens Cybersecurity with Advanced Capabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark