CVE-2026-2095
Flowring · Agentflow
Agentflow by Flowring suffers from an authentication bypass vulnerability, allowing unauthenticated attackers to obtain arbitrary user tokens and impersonate any user.
Executive summary
An unauthenticated attacker can bypass security controls in Agentflow to steal user tokens and log in as any user, including administrators, gaining full control over the system.
Vulnerability
This vulnerability allows an unauthenticated remote attacker to exploit a specific functionality to generate or retrieve valid authentication tokens for any user in the system. This effectively bypasses the entire login mechanism.
Business impact
With a CVSS score of 9.8, the business risk is extreme. An attacker can impersonate high-level executives or system administrators, gaining access to sensitive communications, proprietary workflows, and administrative settings. This leads to a total compromise of user identity and system integrity.
Remediation
Immediate Action: Immediately apply the latest security updates from Flowring to resolve the token generation/retrieval flaw.
Proactive Monitoring: Audit user session logs for multiple concurrent logins from different geographic locations or for administrative logins from unrecognized devices.
Compensating Controls: Implement Multi-Factor Authentication (MFA) across the platform, which may provide an additional layer of defense even if a primary token is compromised.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of an authentication bypass cannot be overstated. Organizations must prioritize patching this vulnerability to prevent attackers from assuming the identities of legitimate users and compromising the entire organizational workflow managed by Agentflow.