CVE-2025-26319 Scanner
CVE-2025-26319 Scanner - Arbitrary File Upload vulnerability in Flowise
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
24 days 5 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
Flowise is a software product developed by FlowiseAI. It is widely used in AI-related fields by tech companies and research institutions. The software provides tools and frameworks that help in building AI pipelines and managing machine learning models efficiently. It is valued for its user-friendly interface and robust functionality, making it a popular choice for both small startups and large corporations in the AI sector. Flowise supports integration with various datasets and APIs, enhancing its utility in diverse applications. Organizations utilize Flowise for optimizing AI workflows and improving analytical capabilities.
This scanner identifies an Arbitrary File Upload vulnerability in Flowise version 2.2.6 and below. The vulnerability arises from the ability to upload files outside the intended directory, potentially leading to severe security breaches. Attackers can exploit this flaw to overwrite critical configuration files, which may expose sensitive information like API keys. The vulnerability can be used to execute code remotely, giving unauthorized access to the system. This kind of vulnerability poses significant risks if left unaddressed.
The vulnerability occurs at the /api/v1/attachments endpoint where attackers can upload files due to inadequate path restrictions. Specifically, the flaw allows file uploads through a traversal technique to directories outside the intended scope. The configuration file, .flowise/api.json, is particularly at risk of being overwritten, leading to potential system compromises. Attackers can use this vulnerability to inject malicious scripts that execute on the server, leading to full control over the application. Unauthorized file uploads can thus lead to significant system disruption.
When exploited, this vulnerability can lead to loss of critical data and unauthorized access to sensitive information. Attackers may gain control over the system configuration, posing risks of remote code execution. This could result in unauthorized access to the application's backend and potential data breaches. API key exposure is a significant risk, leading to further unauthorized operations through the compromised APIs. Additionally, system integrity might be compromised, potentially affecting uptime and business operations.
REFERENCES