Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flowise AI Vulnerability Exploited in Cyber Attacks

Critical Flowise AI Vulnerability Exploited in Cyber Attacks

Posted on April 7, 2026 By CWS

Cybersecurity experts are sounding the alarm over a severe remote code execution (RCE) vulnerability in Flowise, an open-source platform used to create AI agents and tailor large language model workflows. This critical issue, identified as CVE-2025-59528 and carrying a maximum CVSS score of 10.0, allows perpetrators to run arbitrary JavaScript code, potentially compromising entire systems.

Widespread Exposure and Exploitation

According to threat intelligence data, an estimated 12,000 to 15,000 instances of Flowise are currently accessible via the public internet. This extensive exposure presents a significant opportunity for malicious actors to exploit the vulnerability. The flaw originates from inadequate input validation within Flowise’s CustomMCP node, which manages configuration settings for external Model Context Protocol (MCP) servers.

Instead of securely parsing incoming data, the platform’s convertToValidJSONString function passes the user-supplied mcpServerConfig string directly to a Function() constructor. This oversight allows the input to be executed as JavaScript code within the global Node.js context, enabling attackers to deploy harmful payloads with unrestricted runtime privileges.

Technical Exploitation Details

Exploiting CVE-2025-59528 is alarmingly straightforward, requiring no user interaction. Attackers simply send a specially crafted HTTP POST request to the application’s API endpoint over the network. Once the payload triggers the vulnerable constructor, it leverages core Node.js modules like child_process to execute system-level commands.

The repercussions are severe, granting attackers full system access, enabling them to navigate the file system and extract sensitive corporate data. A publicly available proof-of-concept exploit highlights how attackers can easily harness this vulnerability using basic command-line utilities. By embedding a payload that invokes system modules, attackers can manipulate the server to perform remote commands, including writing arbitrary files to temporary storage.

Cybersecurity Community Response

In April 2026, VulnCheck security researchers recorded the first known exploitation of this vulnerability in real-world scenarios, with initial attacks traced back to a Starlink IP address. The flaw is garnering considerable attention within the cybersecurity field due to the sheer number of exposed systems and the simplicity of the exploit.

This incident is part of a broader trend of targeted attacks on AI infrastructure, following previous exploits of other Flowise vulnerabilities. Versions of Flowise up to 3.0.5 remain susceptible to this critical code injection issue, which has been rectified in version 3.0.6 through enhanced security validation of MCP server configurations. Organizations utilizing Flowise are urged to upgrade to the latest version and restrict public network exposure of their application APIs to mitigate risk.

Stay informed with the latest cybersecurity news by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:AI vulnerability, CVE-2025-59528, cyber attacks, Cybersecurity, data breach, Exploit, Flowise, network security, Node.js, remote code execution, security patch, Software Security, software update, system compromise, VulnCheck

Post navigation

Previous Post: New GPU Rowhammer Exploit Threatens Cloud Security
Next Post: Secure Identity Gaps Before 2026 AI Exploits Risk

Related Posts

Cloudflare API Outage Linked to React useEffect Bug Causes Service Overload and Recovery Failure Cloudflare API Outage Linked to React useEffect Bug Causes Service Overload and Recovery Failure Cyber Security News
New DroidLock Malware Locks Android Devices and Demands a Ransom New DroidLock Malware Locks Android Devices and Demands a Ransom Cyber Security News
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users Cyber Security News
Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Cyber Security News
Reclaim Security Secures M for Cybersecurity Innovation Reclaim Security Secures $26M for Cybersecurity Innovation Cyber Security News
Gunra Ransomware Group Leaks 40TB of Data from American Hospital Gunra Ransomware Group Leaks 40TB of Data from American Hospital Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2
  • BlueHammer Exploit Affects Windows Defender Security
  • Why Automated Pentesting Needs a Broader Approach
  • Critical React2Shell Flaw Exploited in Major Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2
  • BlueHammer Exploit Affects Windows Defender Security
  • Why Automated Pentesting Needs a Broader Approach
  • Critical React2Shell Flaw Exploited in Major Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark