radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

sourceThe Hacker News
calendar_todayApril 7, 2026
schedule2 min read
lightbulb

EXECUTIVE SUMMARY

Flowise AI Faces Critical RCE Threat with CVE-2025-59528

Summary

The article discusses a critical security vulnerability in Flowise, an open-source AI platform, which is currently being exploited by threat actors. This flaw, identified as CVE-2025-59528, allows for remote code execution due to a code injection vulnerability.

Key Points

  • The vulnerability is identified as CVE-2025-59528 with a CVSS score of 10.0.
  • It is a code injection vulnerability that allows remote code execution (RCE).
  • Over 12,000 instances of Flowise are exposed to this threat.
  • The vulnerability is actively being exploited by threat actors.
  • The flaw is associated with the CustomMCP node, which allows user input for configuration settings.
  • The findings were reported by VulnCheck.

Analysis

The exploitation of CVE-2025-59528 in Flowise represents a significant threat due to its potential for remote code execution, which can lead to full system compromise. The high CVSS score of 10.0 underscores the critical nature of this vulnerability. With over 12,000 instances at risk, the scale of potential impact is substantial, necessitating immediate attention from IT professionals managing Flowise deployments.

Conclusion

IT professionals should prioritize patching and securing Flowise instances to mitigate the risk of exploitation. Regularly monitoring for updates from VulnCheck and other security advisories is recommended to stay informed about potential threats and remediation strategies.