The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
References
Configurations
No configuration.
History
14 Aug 2025, 13:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Aug 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-14 10:15
Updated : 2025-08-14 13:11
NVD link : CVE-2025-8943
Mitre link : CVE-2025-8943
CVE.ORG link : CVE-2025-8943
JSON object : View
Products Affected
No product.
CWE
No CWE.