Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Severe Vulnerability Exploited in Flowise AI Platform

Severe Vulnerability Exploited in Flowise AI Platform

Posted on April 7, 2026 By CWS

A major security flaw in the Flowise AI platform, an open-source application, is currently under exploitation by cybercriminals, as revealed by VulnCheck. Identified as CVE-2025-59528, this vulnerability has been assigned the maximum severity score of 10.0 under the Common Vulnerability Scoring System (CVSS).

Understanding the Vulnerability

The flaw, a code injection vulnerability, allows for remote code execution via the CustomMCP node. This node processes user inputs to configure connections to external servers using a string called mcpServerConfig. Unfortunately, Flowise’s advisory from September 2025 highlighted that this process executes JavaScript code without proper security checks.

When exploited, this vulnerability grants attackers access to critical Node.js modules like child_process and fs, enabling command execution and file system access. In essence, attackers can execute arbitrary JavaScript code, leading to complete system compromise and potential data breaches.

Security Implications and Responses

Flowise has emphasized the significant risk posed by this vulnerability, as it only requires an API token to exploit, threatening business operations and customer data. The issue was initially discovered and reported by Kim SooHyun and has since been addressed in version 3.0.6 of the npm package.

VulnCheck reported that the exploitation attempts are traced back to a single Starlink IP address. This vulnerability marks the third instance of a Flowise flaw being exploited in the wild, following CVE-2025-8943 and CVE-2025-26319, with CVSS scores of 9.8 and 8.9, respectively.

Wider Impact and Future Outlook

Caitlin Condon from VulnCheck described this as a critical-severity bug affecting a widely used AI platform by numerous large companies. Despite being publicly known for over six months, many instances remain vulnerable. The exposure of over 12,000 instances has expanded the attack surface significantly, making them attractive targets for opportunistic attackers.

As the situation unfolds, it is crucial for organizations using Flowise AI to ensure their systems are updated and patched promptly to mitigate potential risks. Continuous monitoring and proactive security measures are recommended to safeguard against future exploitation attempts.

The Hacker News Tags:AI platform, API token, CVE-2025-59528, Cybersecurity, data breach, Flowise AI, Kim SooHyun, Node.js, npm package, remote code execution, security flaw, Starlink IP, system compromise, VulnCheck, Vulnerability

Post navigation

Previous Post: Windows Defender Zero-Day Exploit Unveiled by Researcher
Next Post: Wynn Resorts Data Breach Affects Over 21,000 Employees

Related Posts

Policy, Isolation, and Data Controls That Actually Work Policy, Isolation, and Data Controls That Actually Work The Hacker News
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features The Hacker News
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage The Hacker News
Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access The Hacker News
Why CTEM is the Winning Bet for CISOs in 2025 Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News
India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China’s Storm-1175 Launches Rapid Medusa Ransomware Attacks
  • Storm-1175 Exploits Internet Vulnerabilities in Medusa Attacks
  • Wynn Resorts Data Breach Affects Over 21,000 Employees
  • Severe Vulnerability Exploited in Flowise AI Platform
  • Windows Defender Zero-Day Exploit Unveiled by Researcher

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China’s Storm-1175 Launches Rapid Medusa Ransomware Attacks
  • Storm-1175 Exploits Internet Vulnerabilities in Medusa Attacks
  • Wynn Resorts Data Breach Affects Over 21,000 Employees
  • Severe Vulnerability Exploited in Flowise AI Platform
  • Windows Defender Zero-Day Exploit Unveiled by Researcher

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark