CVE-2026-30822: Flowise: mass assignment allows unauthenticated DB injection
UNKNOWN PoC AVAILABLE CISA: ATTENDFlowise, a widely deployed drag-and-drop LLM agent builder, contains a mass assignment flaw (CWE-915) that allows any unauthenticated user to inject arbitrary values into internal database fields through the lead creation endpoint — no credentials required. A public proof-of-concept already exists, and this package carries a history of 16 prior CVEs, signaling a pattern of insufficient input validation in a platform that often holds API keys, agent configurations, and sensitive workflow data. Blast radius extends to any Flowise instance exposed to the internet: successful exploitation could enable record tampering, privilege escalation within the platform, or corruption of LLM agent flow configurations. Upgrade to Flowise 3.0.13 immediately; if patching is blocked, isolate the Flowise API behind a network perimeter and audit database records for unexpected or injected field values.
What is the risk?
HIGH. The vulnerability is unauthenticated (no prior access required), has a public PoC, and targets a platform that sits at the center of LLM agent orchestration — a high-value target for attackers seeking to manipulate AI pipelines. The lack of CVSS scoring does not reduce real-world risk; the unauthenticated attack vector and available exploit code make this trivially weaponizable. The package's 16 prior CVEs suggest structural security debt.
What systems are affected?
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| flowise | npm | — | No patch |
Do you use flowise? You're affected.
Severity & Risk
What should I do?
6 steps-
Patch immediately: upgrade all Flowise instances to version 3.0.13 or later.
-
If immediate patching is not possible: place Flowise behind a VPN or firewall to prevent unauthenticated internet access to the API.
-
Audit database records — particularly lead, user, and configuration tables — for unexpected field values or signs of injection attempts (fields containing unexpected JSON keys or privilege-related values).
-
Review application logs for anomalous POST requests to lead creation endpoints originating from unauthenticated sessions.
-
Rotate any API keys, credentials, or tokens stored within the Flowise platform as a precaution.
-
Subscribe to Flowise security advisories given the package's CVE history.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-30822?
Flowise, a widely deployed drag-and-drop LLM agent builder, contains a mass assignment flaw (CWE-915) that allows any unauthenticated user to inject arbitrary values into internal database fields through the lead creation endpoint — no credentials required. A public proof-of-concept already exists, and this package carries a history of 16 prior CVEs, signaling a pattern of insufficient input validation in a platform that often holds API keys, agent configurations, and sensitive workflow data. Blast radius extends to any Flowise instance exposed to the internet: successful exploitation could enable record tampering, privilege escalation within the platform, or corruption of LLM agent flow configurations. Upgrade to Flowise 3.0.13 immediately; if patching is blocked, isolate the Flowise API behind a network perimeter and audit database records for unexpected or injected field values.
Is CVE-2026-30822 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2026-30822, increasing the risk of exploitation.
How to fix CVE-2026-30822?
1. Patch immediately: upgrade all Flowise instances to version 3.0.13 or later. 2. If immediate patching is not possible: place Flowise behind a VPN or firewall to prevent unauthenticated internet access to the API. 3. Audit database records — particularly lead, user, and configuration tables — for unexpected field values or signs of injection attempts (fields containing unexpected JSON keys or privilege-related values). 4. Review application logs for anomalous POST requests to lead creation endpoints originating from unauthenticated sessions. 5. Rotate any API keys, credentials, or tokens stored within the Flowise platform as a precaution. 6. Subscribe to Flowise security advisories given the package's CVE history.
What systems are affected by CVE-2026-30822?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, LLM orchestration platforms, no-code AI workflow builders, multi-tenant AI SaaS deployments.
What is the CVSS score for CVE-2026-30822?
No CVSS score has been assigned yet.
Technical Details
NVD Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in version 3.0.13.
Exploitation Scenario
An adversary identifies a publicly exposed Flowise instance — trivially discoverable via Shodan or similar tooling searching for Flowise-specific headers or paths. Without any credentials, they send a crafted POST request to the lead creation endpoint, embedding additional database fields beyond the intended payload (e.g., role escalation flags, admin boolean fields, or references to other users' configurations). The injected values persist to the database. The attacker may then use escalated permissions to access authenticated endpoints, extract stored API keys for downstream LLM providers (OpenAI, Anthropic), or modify LLM flow configurations to redirect agent tool calls to attacker-controlled infrastructure — turning the compromised Flowise instance into a pivot point for prompt injection or data exfiltration from connected AI services.
Weaknesses (CWE)
References
- github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.13 Product Release
- github.com/FlowiseAI/Flowise/security/advisories/GHSA-mq4r-h2gh-qv7x Exploit Mitigation Vendor
Timeline
Related Vulnerabilities
CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same package: flowise CVE-2025-61913 9.9 Flowise: path traversal in file tools leads to RCE
Same package: flowise CVE-2026-40933 9.9 Flowise: RCE via MCP stdio command injection
Same package: flowise CVE-2026-30824 9.8 Flowise: auth bypass exposes NVIDIA NIM container endpoints
Same package: flowise CVE-2026-30821 9.8 flowise: Arbitrary File Upload enables RCE
Same package: flowise