CVE-2026-30823
Received Received - Intake
IDOR in Flowise Allows Account Takeover via SSO Configuration

Publication date: 2026-03-07

Last updated on: 2026-03-11

Assigner: GitHub, Inc.

Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, there is an IDOR vulnerability, leading to account takeover and enterprise feature bypass via SSO configuration. This issue has been patched in version 3.0.13.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-07
Last Modified
2026-03-11
Generated
2026-05-07
AI Q&A
2026-03-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
flowiseai flowise to 3.0.13 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-30823 is a critical vulnerability in the Flowise platform affecting versions up to 3.0.12. It is an Insecure Direct Object Reference (IDOR) combined with a business logic flaw in the PUT /api/v1/loginmethod endpoint. Although this endpoint requires authentication, it does not verify whether the authenticated user has ownership or administrative rights over the specified organizationId in the request body.'}, {'type': 'paragraph', 'content': 'This lack of authorization checking allows low-privileged users, including those on the Free plan, to overwrite the Single Sign-On (SSO) configuration of any organization by specifying its organizationId. They can enable Enterprise-only features such as SSO/SAML without having the required license and perform account takeover by redirecting the authentication flow to attacker-controlled OAuth credentials.'}, {'type': 'paragraph', 'content': "Technically, the backend accepts an organizationId parameter in the JSON payload and updates the corresponding database record without verifying that the requester's organizationId matches the target organizationId. There is no middleware or logic enforcing this ownership check."}] [1]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including account takeover and license bypass.

  • Account Takeover: Attackers can replace legitimate OAuth credentials with their own, causing victim employees to authenticate against attacker-controlled applications, enabling session hijacking or credential theft.
  • License Bypass: Users on the Free tier can illicitly enable and configure SSO providers and other Enterprise-only features without possessing the required license.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the Flowise instance is running a version prior to 3.0.13 and by testing the PUT /api/v1/loginmethod endpoint for improper authorization checks.'}, {'type': 'paragraph', 'content': 'A possible detection method involves sending an authenticated PUT request to /api/v1/loginmethod with an organizationId that does not belong to the authenticated user and observing if the server accepts and applies the changes.'}, {'type': 'paragraph', 'content': 'Example command using curl to test the vulnerability (replace <JWT_TOKEN>, <VICTIM_ORG_ID>, and attacker OAuth credentials accordingly):'}, {'type': 'list_item', 'content': 'curl -X PUT https://<flowise-server>/api/v1/loginmethod -H "Authorization: Bearer <JWT_TOKEN>" -H "Content-Type: application/json" -d \'{"organizationId": "<VICTIM_ORG_ID>", "provider": "google", "clientId": "attacker-client-id", "clientSecret": "attacker-client-secret"}\''}, {'type': 'paragraph', 'content': 'If the server responds with HTTP 200 OK and applies the changes, the system is vulnerable.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Flowise platform to version 3.0.13 or later, where this vulnerability has been patched.

Until the upgrade can be applied, restrict access to the PUT /api/v1/loginmethod endpoint to only trusted administrators and monitor for suspicious activity involving changes to SSO configurations.

Additionally, review OAuth provider configurations for unauthorized changes and reset any compromised credentials.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart