CVE-2026-2096

Flowring · Agentflow

Agentflow by Flowring contains a missing authentication vulnerability, allowing unauthenticated remote attackers to read, modify, or delete database contents.

Executive summary

A critical authentication failure in Agentflow allows unauthenticated attackers to directly manipulate the application database, leading to potential total data loss or exposure.

Vulnerability

The application fails to enforce authentication on specific functional modules. This allows an unauthenticated remote attacker to interact with the database, providing them with the ability to query, alter, or purge records at will.

Business impact

The CVSS score of 9.8 indicates a catastrophic level of risk. An attacker can essentially take over the data layer of the application without a password, leading to the exposure of confidential business data, unauthorized modification of workflows, or the complete deletion of the database, resulting in permanent data loss.

Remediation

Immediate Action: Update Agentflow to the latest version provided by Flowring to enforce proper authentication checks on all functional modules.

Proactive Monitoring: Monitor database logs for unauthorized CRUD (Create, Read, Update, Delete) operations originating from the web application's service account.

Compensating Controls: Restrict network access to the Agentflow server to trusted internal segments only and deploy a WAF to block unauthorized access to sensitive application paths.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a fundamental security breakdown. It is critical to apply the vendor's update immediately. Organizations should also conduct a full security audit of the Agentflow platform to ensure no other functions are exposed without authentication.