CVE-2025-26319 Scanner

CVE-2025-26319 Scanner - Arbitrary File Upload vulnerability in Flowise

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

24 days 5 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

Flowise is a software product developed by FlowiseAI. It is widely used in AI-related fields by tech companies and research institutions. The software provides tools and frameworks that help in building AI pipelines and managing machine learning models efficiently. It is valued for its user-friendly interface and robust functionality, making it a popular choice for both small startups and large corporations in the AI sector. Flowise supports integration with various datasets and APIs, enhancing its utility in diverse applications. Organizations utilize Flowise for optimizing AI workflows and improving analytical capabilities.

This scanner identifies an Arbitrary File Upload vulnerability in Flowise version 2.2.6 and below. The vulnerability arises from the ability to upload files outside the intended directory, potentially leading to severe security breaches. Attackers can exploit this flaw to overwrite critical configuration files, which may expose sensitive information like API keys. The vulnerability can be used to execute code remotely, giving unauthorized access to the system. This kind of vulnerability poses significant risks if left unaddressed.

The vulnerability occurs at the /api/v1/attachments endpoint where attackers can upload files due to inadequate path restrictions. Specifically, the flaw allows file uploads through a traversal technique to directories outside the intended scope. The configuration file, .flowise/api.json, is particularly at risk of being overwritten, leading to potential system compromises. Attackers can use this vulnerability to inject malicious scripts that execute on the server, leading to full control over the application. Unauthorized file uploads can thus lead to significant system disruption.

When exploited, this vulnerability can lead to loss of critical data and unauthorized access to sensitive information. Attackers may gain control over the system configuration, posing risks of remote code execution. This could result in unauthorized access to the application's backend and potential data breaches. API key exposure is a significant risk, leading to further unauthorized operations through the compromised APIs. Additionally, system integrity might be compromised, potentially affecting uptime and business operations.

REFERENCES

Get started to protecting your digital assets