CVE-2025-8943
14.08.2025, 10:15
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.Enginsight
| Vendor | Product | Version |
|---|---|---|
| flowiseai | flowise | 𝑥 < 3.0.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration