TopVuln

High-risk vulnerability digests

CVE-2026-41266

  • HIGH

security-advisories@github.com

Details

CVSS v3
7.5
CVSS v4
7.7
NVD published
2026-04-23 20:16:15
EPSS
<0.1% probability · 13.1th percentile — 2026-05-12
Affected versions
Flowise prior to 3.1.0
Summary
This vulnerability allows unauthenticated remote attackers to access sensitive data including API keys, HTTP authorization headers, and internal configuration from affected Flowise deployments. Attackers only need knowledge of a chatflow UUID to retrieve the exposed sensitive data. Successful exploitation leads to credential theft and unauthorized access to connected downstream systems.
Remediation
Upgrade Flowise to version 3.1.0 or later to remediate this issue. Restrict public access to Flowise API endpoints from untrusted networks if the service is not intended for public exposure. Rotate any exposed credentials after patching to prevent unauthorized access.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.