CVE-2025-59527: Flowise: unauthenticated SSRF exposes internal network
HIGH PoC AVAILABLEFlowise 3.0.5 contains an unauthenticated Server-Side Request Forgery in its /api/v1/fetch-links endpoint, enabling any network-accessible attacker to coerce the Flowise server into proxying HTTP requests to internal services and returning their content. Flowise deployments are typically positioned inside enterprise networks with broad access to internal APIs, vector databases, LLM gateways, and cloud infrastructure — making SSRF here significantly more dangerous than in a generic web application. A public PoC exists, exploitation requires zero privileges and zero user interaction (CVSS AV:N/AC:L/PR:N/UI:N), and the package carries 16 prior CVEs indicating a persistent pattern of insufficient security review. Patch to Flowise 3.0.6 immediately; if patching is blocked, restrict /api/v1/fetch-links at the reverse proxy layer and audit outbound HTTP logs for requests targeting RFC1918 ranges or cloud metadata endpoints such as 169.254.169.254.
Risk Assessment
High risk. Zero-authentication network exploitation with a public PoC lowers the attacker skill floor to near-zero. Flowise is commonly deployed with internal network access to LLM APIs, vector stores, and backend services, making SSRF a pivot point into broader AI infrastructure. Cloud deployments face additional exposure from metadata endpoint abuse (AWS IMDSv1, GCP metadata server) that could yield temporary IAM credentials enabling full cloud account compromise. The 16 prior CVEs in this package signal a systemic vulnerability management gap that warrants elevated scrutiny.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| flowise | npm | — | No patch |
Do you use flowise? You're affected.
Severity & Risk
Recommended Action
- Patch immediately: upgrade to Flowise 3.0.6.
- If patching is delayed, block or rate-limit the /api/v1/fetch-links endpoint at the WAF or reverse proxy with an explicit deny rule.
- Implement outbound egress controls for Flowise containers — restrict outbound HTTP to a specific allowlist of required external domains.
- In cloud environments, enforce IMDSv2 with hop-limit=1 on EC2/GCP instances to block metadata SSRF.
- Audit access logs for anomalous outbound requests to 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, and 169.254.169.254.
- Network-segment Flowise deployments so they cannot directly reach production databases, secrets stores, or other sensitive internal services.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, a Server-Side Request Forgery (SSRF) vulnerability was discovered in the /api/v1/fetch-links endpoint of the Flowise application. This vulnerability allows an attacker to use the Flowise server as a proxy to access internal network web services and explore their link structures. This issue has been patched in version 3.0.6.
Exploitation Scenario
An attacker discovers a Flowise instance exposed on a corporate or cloud network — common in AI/ML teams using Flowise for LLM workflow prototyping. Without any credentials, they send a request to /api/v1/fetch-links with the URL parameter targeting http://169.254.169.254/latest/meta-data/iam/security-credentials/ (AWS IMDS) or an internal service such as http://internal-vector-db:6333/collections. Flowise fetches the URL and returns the response body directly, yielding AWS temporary IAM credentials or internal service enumeration data. With cloud credentials in hand, the attacker escalates to full AWS account access, potentially exfiltrating training datasets, model weights, and customer data from S3 or RDS backing the AI platform.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N References
- github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/components/src/utils.ts Product
- github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/controllers/fetch-links/index.ts Product
- github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/services/fetch-links/index.ts Product
- github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.6 Release
- github.com/FlowiseAI/Flowise/security/advisories/GHSA-hr92-4q35-4j3m Exploit Vendor
Timeline
Related Vulnerabilities
CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same package: flowise CVE-2025-61913 9.9 Flowise: path traversal in file tools leads to RCE
Same package: flowise CVE-2026-30821 9.8 flowise: Arbitrary File Upload enables RCE
Same package: flowise CVE-2026-30824 9.8 Flowise: auth bypass exposes NVIDIA NIM container endpoints
Same package: flowise CVE-2025-58434 9.8 Flowise: auth bypass in reset flow allows full ATO
Same package: flowise
AI Threat Alert