CVE-2025-55346

User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
Configurations

No configuration.

History

14 Aug 2025, 16:15

Type Values Removed Values Added
References () https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/ - () https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/ -

14 Aug 2025, 13:11

Type Values Removed Values Added
Summary
  • (es) Los flujos de entrada controlados por el usuario conducen a una implementación insegura de un constructor de función dinámico, lo que permite a los atacantes de la red ejecutar código JS arbitrario no protegido en el contexto del host, enviando una simple solicitud POST.

14 Aug 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-14 10:15

Updated : 2025-08-14 16:15


NVD link : CVE-2025-55346

Mitre link : CVE-2025-55346

CVE.ORG link : CVE-2025-55346


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')