Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-59528 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Flowise 3.0.5 suffers from **Code Injection** in the `CustomMCP` node. πŸ“‰ **Consequences**: Attackers can achieve **Remote Code Execution (RCE)** by injecting malicious JavaScript.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection). The `convertToValidJSONString` function directly passes user input to the JavaScript `Function()` constructor.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Flowise** versions **3.0.5** and likely earlier. 🧩 **Component**: Specifically the **CustomMCP** node used for connecting to external MCP servers. 🏒 **Vendor**: FlowiseAI.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: Attackers gain **full Node.js privileges**. πŸ“‚ **Data**: Complete access to the server's file system, environment variables, and network. πŸ”„ **Impact**: Critical (CVSS High) – total system compromise.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **Low**. 🌐 **Access**: Network-accessible (AV:N). πŸ”‘ **Auth**: None required (PR:N/UI:N). βš™οΈ **Config**: Exploitation requires the victim to process user input through the vulnerable `CustomMCP` node.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exp**: **Yes**. Multiple PoCs are available on GitHub (e.g., `zimshk/CVE-2025-59528.yaml`). πŸš€ **Automation**: Nuclei templates are also published, making automated exploitation easy for attackers.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for Flowise instances running version **3.0.5**. πŸ§ͺ **Test**: Use the provided YAML PoC to trigger the `Function()` injection via the `CustomMCP` node configuration.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: **Yes**. Version **3.0.6** has been released. πŸ“₯ **Action**: Upgrade immediately to **Flowise 3.0.6** or later. πŸ”„ **Patch**: The vendor has addressed the unsafe evaluation in the new release.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If you cannot upgrade, **disable or remove** the `CustomMCP` node entirely. 🚫 **Restrict**: Do not allow untrusted users to configure MCP server connections.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P0**. With public PoCs and low exploitation barriers, immediate patching to v3.0.6 is essential to prevent active exploitation and server takeover.