CVE-2025-61913: Flowise: path traversal in file tools leads to RCE
CRITICAL PoC AVAILABLEFlowise's built-in WriteFileTool and ReadFileTool — agent-accessible tools in the drag-and-drop LLM workflow builder — perform no path sanitization, allowing any authenticated user (low privilege) to read or write arbitrary files anywhere on the host filesystem, with a direct path to remote code execution. The CVSS score of 9.9 reflects the full scope impact (S:C): a single compromised Flowise instance can expose all credentials, configurations, and AI pipeline data on the host, and write-access means attackers can plant webshells or overwrite critical system files. A public proof-of-concept exploit exists and there are 16 CVEs in this package's history, indicating a pattern of security debt — treat this as actively exploitable. Patch to Flowise 3.0.8 immediately; if immediate patching is not feasible, disable WriteFileTool and ReadFileTool in all flows via the node configuration and restrict Flowise to isolated, sandboxed environments with no access to host credentials or sensitive paths.
Risk Assessment
Risk is CRITICAL. CVSS 9.9 with network-accessible, low-complexity, low-privilege attack vector and full confidentiality/integrity/availability impact with scope change. A public PoC lowers the bar to script-kiddie level. Flowise is widely deployed by teams building LLM workflows — many deployments expose the UI to internal networks or even the internet. The combination of arbitrary file read (credential harvesting, .env exfiltration, API key theft) and arbitrary file write (webshell deployment, config poisoning, cron-based persistence) makes this a full-host compromise scenario, not just application-level. The 16 prior CVEs in the package signal a systemic lack of security controls in this codebase.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| flowise | npm | — | No patch |
| flowise | npm | — | No patch |
Severity & Risk
Recommended Action
- Patch immediately to Flowise 3.0.8 — the fix is available and the patch commit is public (1fb12cd).
- If patching is delayed: disable WriteFileTool and ReadFileTool nodes in all existing flows and block their use via Flowise's tool configuration.
- Audit access logs for unexpected file path arguments to these tools — look for path traversal patterns (../, /etc/, /home/, /.env).
- Rotate all credentials accessible from the Flowise host (API keys, DB passwords, cloud credentials).
- Deploy Flowise in a containerized environment with filesystem isolation — mount only required directories, not the full host filesystem.
- Restrict Flowise to authenticated internal users only; disable public-facing access until patched.
- Scan for webshells or modified files if the system was potentially exposed pre-patch.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
Flowise is a drag & drop user interface to build a customized large language model flow. In versions prior to 3.0.8, WriteFileTool and ReadFileTool in Flowise do not restrict file path access, allowing authenticated attackers to exploit this vulnerability to read and write arbitrary files to any path in the file system, potentially leading to remote command execution. Flowise 3.0.8 fixes this vulnerability.
Exploitation Scenario
An attacker with any authenticated Flowise account (even a trial or low-privilege account) builds or modifies a flow that includes ReadFileTool with the path set to ../../../../.env or /proc/self/environ. Execution of this flow returns all environment variables, including LLM API keys, database credentials, and cloud provider tokens. The attacker then uses WriteFileTool with an absolute path to write a PHP or Python webshell to a web-accessible directory, or modifies a cron job to establish persistence. In an agentic context, this attack can be fully automated — an LLM orchestrating the flow can be prompted to iteratively explore the filesystem, exfiltrate credentials, and establish C2, all within the normal Flowise agent execution loop and without triggering traditional anomaly detection.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H References
- github.com/FlowiseAI/Flowise/commit/1fb12cd93143592a18995f63b781d25b354d48a3 Patch
- github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.8 Release
- github.com/FlowiseAI/Flowise/security/advisories/GHSA-j44m-5v8f-gc9c Exploit Vendor
- github.com/FlowiseAI/Flowise/security/advisories/GHSA-jv9m-vf54-chjj Exploit Vendor
Timeline
Related Vulnerabilities
CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same package: flowise CVE-2025-58434 9.8 Flowise: auth bypass in reset flow allows full ATO
Same package: flowise CVE-2026-30824 9.8 Flowise: auth bypass exposes NVIDIA NIM container endpoints
Same package: flowise CVE-2026-30821 9.8 flowise: Arbitrary File Upload enables RCE
Same package: flowise CVE-2026-31829 8.8 Flowise: SSRF via HTTP Node exposes internal network
Same package: flowise
AI Threat Alert