Flowise RCE via Malicious JavaScript Uploads
The National Vulnerability Database has disclosed CVE-2026-41269, a high-severity vulnerability (CVSS 7.1) affecting Flowise, a drag-and-drop UI for building custom large language model flows. Prior to version 3.1.0, Flowise allowed modification of Chatflow configuration file upload settings to accept application/javascript MIME types. This bypasses frontend restrictions and permits attackers to upload .js files.
This flaw enables threat actors to persistently store malicious Node.js web shells on the server. The National Vulnerability Database indicates this can lead to Remote Code Execution (RCE), giving attackers full control over the compromised system. The vulnerability is tracked as CWE-434, a common weakness involving unrestricted upload of dangerous file types.
For defenders, this is a critical supply chain risk. An RCE in a tool like Flowise, often used for AI/ML development, can lead to data exfiltration, system compromise, and further lateral movement within an environment. Patching is the only viable defense here.
What This Means For You
- If your organization uses Flowise, you need to immediately verify your version. If it's prior to 3.1.0, patch to 3.1.0 or newer *right now*. Then, audit your Flowise server for any suspicious `.js` files in upload directories and review logs for unauthorized file uploads or unusual server activity.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-41269 - Flowise Malicious JavaScript Upload
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-41269 | RCE | Flowise versions prior to 3.1.0 |
| CVE-2026-41269 | RCE | Chatflow configuration file upload settings allowing application/javascript MIME type |
| CVE-2026-41269 | RCE | Upload of .js files to store malicious Node.js web shells |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 23, 2026 at 23:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.