Flowise RCE: Unchecked Input Leads to Code Execution
The National Vulnerability Database has detailed CVE-2026-41138, a high-severity remote code execution (RCE) vulnerability in Flowise, a drag-and-drop UI for building custom large language model flows. Prior to version 3.1.0, the AirtableAgent.ts component fails to properly verify user input when leveraging Pandas.
This oversight allows user input to be directly inserted into the question parameter of a prompt template, which is then reflected into Python code without any sanitization. This direct injection creates a clear path for attackers to execute arbitrary code remotely. The National Vulnerability Database assigns a CVSSv3 score of 8.3 (High) to this flaw, underscoring its critical nature.
Flowise users must recognize that this isn’t just a theoretical vulnerability. It’s a direct code injection vector. Attackers leveraging this could completely compromise the underlying system hosting the Flowise application. The fix is available in version 3.1.0, making patching an immediate priority.
What This Means For You
- If your organization uses Flowise, you need to verify your version immediately. This isn't a complex exploit; it's a straightforward remote code execution vulnerability stemming from unchecked input. Patch to version 3.1.0 or higher right now. If you're running an exposed instance, assume compromise and initiate incident response protocols.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41138 - Flowise AirtableAgent RCE via Pandas
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41138 | RCE | Flowise < 3.1.0 |
| CVE-2026-41138 | RCE | Vulnerable component: AirtableAgent.ts |
| CVE-2026-41138 | RCE | Vulnerable function: input applied to 'question' parameter within prompt template, reflected to Python code without sanitization |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 23, 2026 at 23:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.