CVE-2025-57164
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-10-17
Last updated on: 2025-10-23
Assigner: MITRE
Description
Description
Flowise through v3.0.4 is vulnerable to remote code execution via unsanitized evaluation of user input in the "Supabase RPC Filter" field.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flowiseai | flowise | 3.0.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Flowise version 3.0.4 allows remote code execution because the application evaluates user input in the "Supabase RPC Filter" field without proper sanitization. This means an attacker can inject malicious code through this field, which the system then executes.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary code remotely on the affected system, potentially leading to unauthorized access, data theft, system compromise, or disruption of services.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70