GHSA-5h9v-837x-m97r: Flowise: mass assignment enables cross-workspace data takeover
GHSA-5h9v-837x-m97r HIGHFlowise's Dataset API contains a mass assignment flaw where authenticated workspace members can overwrite the workspaceId (and id) fields of any dataset simply by including them in a PUT or POST request body, because the service copies the raw request body onto the entity object without an allowlist. In multi-tenant Flowise deployments—common wherever teams, clients, or business units share a single instance—this allows any user with normal dataset edit permissions to silently migrate training or evaluation data into any other workspace, since workspace UUIDs are trivially enumerable from standard API responses; the operation leaves no anomalous audit trail because it registers as a routine update. No CVSSv3 vector is formally published yet, but the exploit chain is one HTTP request with a crafted body and zero privilege escalation required, making this effectively a trivial IDOR with immediate cross-tenant data breach impact. Upgrade to flowise 3.1.2 now; the patch (PR #6051) applies an explicit field allowlist matching the prior DocumentStore fix, and post-upgrade testing should assert that workspaceId and id in request bodies are silently ignored.
What is the risk?
High risk for any multi-tenant Flowise deployment. The attack requires only a valid authenticated session and knowledge of a target workspace UUID — both conditions are easily met in any shared environment. Workspace UUIDs are exposed across numerous Flowise API responses, making enumeration trivial without any special tooling. The vulnerability breaks the foundational workspace isolation guarantee, meaning a single compromised or malicious insider can breach data boundaries across every workspace in the instance. With 76 historical CVEs in the flowise npm package, this is also a signal of systemic secure-coding posture concerns in the codebase.
Attack Kill Chain
What systems are affected?
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| flowise | npm | <= 3.1.1 | 3.1.2 |
Do you use flowise? You're affected.
Severity & Risk
What should I do?
5 steps-
Patch immediately: upgrade flowise to v3.1.2 which applies an explicit per-field allowlist in the Dataset service (PR #6051), matching the pattern already applied to DocumentStore in commit 840d2ae.
-
Audit dataset ownership: query the datasets table for rows where workspaceId does not match the creating user's original workspace, or where createdDate/updatedDate are inconsistent with audit logs.
-
API-layer control: if immediate upgrade is blocked, configure your reverse proxy or WAF to reject PUT/POST requests to /api/v1/datasets/* that contain workspaceId, id, createdDate, or updatedDate keys in the request body.
-
Detection rule: alert on any API request body to dataset endpoints containing ownership-bearing field names — this should be a zero-frequency event in a patched system and a high-fidelity signal in an unpatched one.
-
Regression gate: add tests asserting these fields are ignored or rejected on both create and update paths before merging future Dataset-service changes.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is GHSA-5h9v-837x-m97r?
Flowise's Dataset API contains a mass assignment flaw where authenticated workspace members can overwrite the workspaceId (and id) fields of any dataset simply by including them in a PUT or POST request body, because the service copies the raw request body onto the entity object without an allowlist. In multi-tenant Flowise deployments—common wherever teams, clients, or business units share a single instance—this allows any user with normal dataset edit permissions to silently migrate training or evaluation data into any other workspace, since workspace UUIDs are trivially enumerable from standard API responses; the operation leaves no anomalous audit trail because it registers as a routine update. No CVSSv3 vector is formally published yet, but the exploit chain is one HTTP request with a crafted body and zero privilege escalation required, making this effectively a trivial IDOR with immediate cross-tenant data breach impact. Upgrade to flowise 3.1.2 now; the patch (PR #6051) applies an explicit field allowlist matching the prior DocumentStore fix, and post-upgrade testing should assert that workspaceId and id in request bodies are silently ignored.
Is GHSA-5h9v-837x-m97r actively exploited?
No confirmed active exploitation of GHSA-5h9v-837x-m97r has been reported, but organizations should still patch proactively.
How to fix GHSA-5h9v-837x-m97r?
1. Patch immediately: upgrade flowise to v3.1.2 which applies an explicit per-field allowlist in the Dataset service (PR #6051), matching the pattern already applied to DocumentStore in commit 840d2ae. 2. Audit dataset ownership: query the datasets table for rows where workspaceId does not match the creating user's original workspace, or where createdDate/updatedDate are inconsistent with audit logs. 3. API-layer control: if immediate upgrade is blocked, configure your reverse proxy or WAF to reject PUT/POST requests to /api/v1/datasets/* that contain workspaceId, id, createdDate, or updatedDate keys in the request body. 4. Detection rule: alert on any API request body to dataset endpoints containing ownership-bearing field names — this should be a zero-frequency event in a patched system and a high-fidelity signal in an unpatched one. 5. Regression gate: add tests asserting these fields are ignored or rejected on both create and update paths before merging future Dataset-service changes.
What systems are affected by GHSA-5h9v-837x-m97r?
This vulnerability affects the following AI/ML architecture patterns: AI agent frameworks, multi-tenant AI platforms, RAG pipelines, training pipelines, LLMOps platforms.
What is the CVSS score for GHSA-5h9v-837x-m97r?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Summary **Type:** Mass assignment via `Object.assign(entity, body)` -> client-controlled `workspaceId` (and on create, `id`) overwritten on the Dataset entity -> cross-workspace data takeover and IDOR. **File:** `packages/server/src/services/dataset/index.ts` **Root cause:** The Dataset controller/service constructs a `new Dataset()` and copies the request body into it via `Object.assign(...)` without an explicit field allowlist. The request body therefore can include `workspaceId`, `id`, `createdDate`, `updatedDate`. The server only rebinds *some* of these after the assign (e.g. on create, it overwrites `workspaceId` but not `id`; on update, it overwrites `id` but not `workspaceId`). The remaining client-controlled values land directly on the persisted row, breaking workspace isolation. Same root pattern as the dataset entity's sibling controllers and as `DocumentStore` before it was patched in commit 840d2ae. ## Affected Code **File:** `packages/server/src/services/dataset/index.ts` ```ts // create (line 203) and update (line 226) Object.assign(newDataset, body) // <-- BUG: body.id, body.workspaceId accepted ``` **Why it's wrong:** `Object.assign(target, source)` copies every own enumerable property of `source` onto `target`. The TypeORM/SQL persistence layer below it does not strip ownership-bearing columns, so `workspaceId` set in the request body lands as the new `workspaceId` of the persisted row. The DocumentStore patch (commit 840d2ae) demonstrated the intended fix shape (explicit field-by-field allowlist) but it has not been applied to this entity. ## Exploit Chain 1. Attacker is an authenticated member of workspace A. They have a session cookie / JWT for the Flowise web UI. State at this point: attacker can read and write entities scoped to workspace A. 2. Attacker creates a dataset in workspace A via the documented API (or reuses an existing one they own). They note its entity `id`. 3. Attacker issues a `PUT /api/v1/datasets/<id>` (or equivalent endpoint) with a JSON body that includes `"workspaceId": "<workspace-B-id>"` (an arbitrary other workspace's UUID). State at this point: the request reaches the controller as a workspace-A authenticated request. 4. The controller calls `Object.assign(updateEntity, body)`. The body's `workspaceId` overwrites the entity's `workspaceId` field. The persistence layer commits the row. 5. Final state: the dataset row is now owned by workspace B. Workspace B members can see it, modify it, and use it. Workspace A loses access (it no longer satisfies their workspace filter). The original creator's workspace audit shows nothing because the operation looked like a normal update. ## Security Impact **Severity:** High. Cross-workspace boundary violation by any authenticated workspace member. **Attacker capability:** Any authenticated user with permission to update a dataset can move it to any workspace whose UUID they can guess or enumerate (workspace UUIDs are exposed in many API responses, so enumeration is trivial). Datasets hold training / evaluation data scoped to a workspace. Moving a Dataset across workspaces via `workspaceId` overwrite exposes the dataset (rows, schema, references) to the destination workspace. **Preconditions:** Authenticated session with edit permission for the source dataset. No second factor required. Workspace UUIDs are exposed via the `/api/v1/workspaces` listing or via any cross-referenced object's `workspaceId` field, so target enumeration is trivial. **Differential:** PoC-verified by source inspection of the original GHSA-q4pr-4r26-c69r. Patched build (with the suggested fix below) refuses the `workspaceId` field; vulnerable build accepts it and persists it. ## Suggested Fix Already fixed in PR https://github.com/FlowiseAI/Flowise/pull/6051 (allowlist pattern applied). ```ts // Allowlist pattern (matches commit 840d2ae for DocumentStore): const updatedDataset = new Dataset() if (body.<allowed_field_1> !== undefined) updatedDataset.<allowed_field_1> = body.<allowed_field_1> if (body.<allowed_field_2> !== undefined) updatedDataset.<allowed_field_2> = body.<allowed_field_2> // ...whitelist only the documented fields. Never copy id, workspaceId, createdDate, updatedDate from the client. ``` Regression tests should assert that a request body containing `workspaceId`, `id`, `createdDate`, or `updatedDate` is rejected (or at minimum: does not change those columns on the persisted row) for both create and update paths.
Exploitation Scenario
A contractor with legitimate access to a Flowise instance shared across multiple business units authenticates to their scoped workspace and queries /api/v1/workspaces to obtain UUIDs for the HR and Finance workspaces. They create a benign-looking dataset in their workspace, note its entity ID, then issue a single PUT /api/v1/datasets/<id> with body {"name": "normal-update", "workspaceId": "<finance-workspace-uuid>"}. The Dataset service calls Object.assign(entity, body), persisting the new workspaceId directly to the database row. The Finance workspace now owns the dataset; Finance team members can view its contents. Simultaneously, the contractor moves a Finance workspace dataset they discovered via workspaceId cross-references into their own workspace, exfiltrating its training rows through their normal read API access. The entire operation appears in logs as two ordinary dataset updates.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same package: flowise CVE-2026-40933 9.9 Flowise: RCE via MCP stdio command injection
Same package: flowise CVE-2025-61913 9.9 Flowise: path traversal in file tools leads to RCE
Same package: flowise CVE-2026-30821 9.8 flowise: Arbitrary File Upload enables RCE
Same package: flowise CVE-2026-30824 9.8 Flowise: auth bypass exposes NVIDIA NIM container endpoints
Same package: flowise