| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fvcw-9w9r-pxc7 | Flowise affected by Server-Side Request Forgery (SSRF) in HTTP Node Leading to Internal Network Access |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 11 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* |
Wed, 11 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| Vendors & Products |
Flowiseai
Flowiseai flowise |
Tue, 10 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow that performs server-side HTTP requests using user-controlled URLs. By default, there are no restrictions on target hosts, including private/internal IP ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force the Flowise server to make requests to internal network resources that are inaccessible from the public internet. This vulnerability is fixed in 3.0.13. | |
| Title | Flowise affected by Server-Side Request Forgery (SSRF) in HTTP Node Leading to Internal Network Access | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-11T15:19:28.567Z
Reserved: 2026-03-09T17:41:56.077Z
Link: CVE-2026-31829
Updated: 2026-03-11T14:16:03.209Z
Status : Analyzed
Published: 2026-03-10T22:16:20.937
Modified: 2026-03-11T14:24:01.977
Link: CVE-2026-31829
No data.
OpenCVE Enrichment
Updated: 2026-03-11T11:39:11Z
Github GHSA