Flowise RCE Vulnerability CVE-2025-59528 Exploited

12,000 to 15,000 Flowise servers sit exposed to the internet today. One max-severity RCE bug just lit up in active attacks—straight from a Starlink IP.

Flowise dashboard showing vulnerable CustomMCP node with exploit warning overlay

Key Takeaways

  • 12k-15k Flowise servers exposed online, perfect-10 RCE actively exploited via JS injection.
  • CustomMCP node's unsafe eval() of user configs enables full RCE; patched in 3.0.6+.
  • Symptom of no-code AI rush—echoes early WordPress pitfalls, with agentic stakes higher.

15,000.

That’s roughly how many Flowise instances dangle in public view right now, ripe for the picking after hackers lit the fuse on CVE-2025-59528.

A perfect 10 on the CVSS scale—arbitrary code execution via JavaScript injection. Caitlin Condon at VulnCheck spotted it first thing this morning through their Canary network.

“Early this morning, VulnCheck’s Canary network began detecting first-time exploitation of CVE-2025-59528, a CVSS-10 arbitrary JavaScript code injection vulnerability in Flowise, an open-source AI development platform.”

She’s not wrong to sound the alarm. This isn’t some theoretical poke; it’s command execution, file system rummaging, the whole hacker’s delight.

How Does a Drag-and-Drop AI Tool Let Code Run Wild?

Flowise? It’s the low-code darling for stitching together LLM apps and agentic workflows—chatbots, automations, that drag-and-drop magic non-devs crave. Think Zapier meets LangChain, open-source and free.

But here’s the screw-up: the CustomMCP node. It’s meant to hook into external Model Context Protocol servers, pulling in configs from users. Except—no safety net. It slurps that mcpServerConfig input and evals it as JavaScript, raw and unchecked.

Eval. In 2025. On a platform powering customer support bots. Yikes.

Disclosed last September, patched in 3.0.6, latest is 3.1.1 from two weeks back. Yet those 15,000 exposed boxes? Who knows how many limp on ancient versions.

And it’s not alone. This exploit joins CVE-2025-8943 and CVE-2025-26319—also Flowise bugs with in-the-wild pokes. VulnCheck’s holding exploit samples and YARA rules close to the chest for paying customers only.

Look, the activity’s slim so far—one IP, Starlink flavor, probably a lone wolf testing waters. But max-severity RCE in AI tooling? That’s not a splash; it’s a siren.

Why’s Flowise a Hacker Magnet in the Agentic AI Rush?

Blame the architecture—or lack of it. Flowise thrives on user-supplied inputs flying straight into execution pipelines. No-code means trusting the crowd, but crowds build sloppy, and hackers love sloppy.

Here’s my angle the press releases miss: this echoes the early WordPress plugin era, circa 2010. Drag-and-drop exploded; security lagged. Thousands of sites pwned because devs prioritized features over filters. Now swap PHP for JS eval in AI agents—same vibe, higher stakes.

Agentic systems? They’re the next boom. Autonomous AI that acts, not just chats. Flowise pipelines those agents. One injected script, and your bot’s not assisting customers—it’s exfiltrating data or mining crypto.

Companies running support chatbots? Prototypers chaining LLMs? If it’s public-facing without patches, you’re betting on obscurity. And obscurity’s dying fast.

Patch to 3.1.1, stat. Better yet, yank it off the public net unless you need it. Firewalls? Sure, but BAS tools show most controls crumble here.

Is Your Flowise Setup Next on the Hit List?

VulnCheck’s canaries pinged from a single Starlink beam—mobile, ephemeral, perfect for opsec-conscious attackers. Limited now, but scans will follow. Shodan lights up those 12k-15k endpoints; bots don’t sleep.

Non-technical users love Flowise’s no-sweat interface. That’s the hook—and the hook for phishers. Imagine a SaaS wrapper around this, marketed to SMBs. One unpatched deploy, and boom: RCE foothold into your infra.

Developers, check your prototypes. That side project agent? If it’s demo’d publicly, kill it. The ‘how’ here is trivial: craft a malicious MCP config, POST it, watch eval() unleash hell.

Prediction: by quarter’s end, we’ll see ransomware crews bundling this into kits. AI tooling’s hot; vulns in it pay.

Flowise’s Other Open Wounds

Don’t sleep on the siblings. CVE-2025-8943 and CVE-2025-26319? Actively exploited too. Flowise’s changelog reads like a vulnerability diary—rushed features, thin validation.

It’s the open-source tax. Popularity breeds eyes, good and bad. Flowise hit stride in the LLM frenzy; maintainers scrambled. Result? Config eval without sanitization. Basic stuff, overlooked.

Corporate spin? Flowise devs fixed it quick—props. But 15k exposed screams adoption outpacing audits. No-code AI’s double-edged: empowers fast, breaks faster.


🧬 Related Insights

Frequently Asked Questions

What is CVE-2025-59528 in Flowise?

Max-severity RCE letting attackers inject and run JavaScript via the CustomMCP node’s unsafe config eval. Leads to full command execution.

How do I fix Flowise RCE vulnerability?

Upgrade to 3.1.1 immediately. Lock down public access; use VPNs or private nets for external MCP hooks.

Are other Flowise CVEs being exploited?

Yes—CVE-2025-8943 and CVE-2025-26319 see wild activity too. Patch everything; scan your instances.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

What is CVE-2025-59528 in Flowise?
Max-severity RCE letting attackers inject and run JavaScript via the CustomMCP node's unsafe config eval. Leads to full command execution.
How do I fix <a href="/tag/flowise-rce/">Flowise RCE</a> vulnerability?
Upgrade to 3.1.1 immediately. Lock down public access; use VPNs or private nets for external MCP hooks.
Are other Flowise CVEs being exploited?
Yes—CVE-2025-8943 and CVE-2025-26319 see wild activity too. Patch everything; scan your instances.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.