CVE-2026-40933
Flowise · Flowise
Flowise prior to 3.1.0 is vulnerable to OS command injection due to unsafe serialization of stdio commands in the MCP adapter, allowing authenticated attackers to execute arbitrary commands.
Executive summary
An authenticated command injection vulnerability in Flowise allows attackers to execute arbitrary code on the underlying host OS.
Vulnerability
The vulnerability exists in the "Custom MCP" configuration interface, where insufficient input sanitization allows an authenticated attacker to inject malicious arguments into stdio commands, bypassing existing validation checks.
Business impact
Successful exploitation grants an attacker full control over the underlying server, enabling data exfiltration, ransomware deployment, or complete system takeover. With a CVSS score of 9.9, this vulnerability represents a critical threat to the confidentiality, integrity, and availability of the host environment.
Remediation
Immediate Action: Upgrade Flowise to version 3.1.0 or later immediately to address the command injection flaw.
Proactive Monitoring: Audit logs for suspicious process creation or unusual command executions originating from the Flowise service account.
Compensating Controls: Implement strict network segmentation and ensure the application runs with the least-privilege principle to contain potential breaches.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
This vulnerability presents a severe risk to infrastructure integrity. Administrators should apply the 3.1.0 update immediately and conduct a thorough review of the application's configuration to ensure no malicious MCP servers were added prior to the patch.