Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-41267 | 8.1 HIGH | Flowise: Improper Mass Assignment in Account Registration Enables Unauthorized Organizatio |
| CVE-2026-41270 | 7.1 HIGH | Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function S |
| CVE-2026-41272 | 7.1 HIGH | Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure) |
| CVE-2026-41269 | 7.1 HIGH | Flowise: File Upload Validation Bypass in createAttachment |
| CVE-2026-41266 | Flowise: Sensitive Data Leak in public-chatbotConfig | |
| CVE-2026-41265 | Flowise: Airtable_Agent Code Injection Remote Code Execution Vulnerability | |
| CVE-2026-41275 | Flowise: Password Reset Link Sent Over Unsecured HTTP | |
| CVE-2026-41278 | Flowise: Public chatflow endpoints return unsanitized flowData including plaintext API key | |
| CVE-2026-41276 | Flowise: AccountService resetPassword Authentication Bypass Vulnerability | |
| CVE-2026-41268 | Flowise: Flowise Parameter Override Bypass Remote Command Execution | |
| CVE-2026-41279 | Flowise: Unauthenticated TTS endpoint accepts arbitrary credential IDs — enables API credi | |
| CVE-2026-41271 | Flowise: APIChain Prompt Injection SSRF in GET/POST API Chains | |
| CVE-2026-41138 | Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input v | |
| CVE-2026-41137 | Flowise: Code Injection in CSVAgent leads to Authenticated RCE | |
| CVE-2026-41277 | Flowise: Mass Assignment in DocumentStore Create Endpoint Leads to Cross-Workspace Object | |
| CVE-2026-41273 | Flowise: Unauthenticated OAuth 2.0 Access Token Disclosure via Public Chatflow | |
| CVE-2026-41274 | Flowise: Cypher Injection in GraphCypherQAChain |
No comments yet