CVE-2026-2095

Flowring · Agentflow

Agentflow by Flowring suffers from an authentication bypass vulnerability, allowing unauthenticated attackers to obtain arbitrary user tokens and impersonate any user.

Executive summary

An unauthenticated attacker can bypass security controls in Agentflow to steal user tokens and log in as any user, including administrators, gaining full control over the system.

Vulnerability

This vulnerability allows an unauthenticated remote attacker to exploit a specific functionality to generate or retrieve valid authentication tokens for any user in the system. This effectively bypasses the entire login mechanism.

Business impact

With a CVSS score of 9.8, the business risk is extreme. An attacker can impersonate high-level executives or system administrators, gaining access to sensitive communications, proprietary workflows, and administrative settings. This leads to a total compromise of user identity and system integrity.

Remediation

Immediate Action: Immediately apply the latest security updates from Flowring to resolve the token generation/retrieval flaw.

Proactive Monitoring: Audit user session logs for multiple concurrent logins from different geographic locations or for administrative logins from unrecognized devices.

Compensating Controls: Implement Multi-Factor Authentication (MFA) across the platform, which may provide an additional layer of defense even if a primary token is compromised.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The severity of an authentication bypass cannot be overstated. Organizations must prioritize patching this vulnerability to prevent attackers from assuming the identities of legitimate users and compromising the entire organizational workflow managed by Agentflow.