Duplicate Advisory: Flowise vulnerable to RCE via Dynamic function constructor injection
Critical severity
GitHub Reviewed
Published
Aug 14, 2025
to the GitHub Advisory Database
•
Updated Oct 3, 2025
Withdrawn
This advisory was withdrawn on Oct 3, 2025
Description
Published by the National Vulnerability Database
Aug 14, 2025
Published to the GitHub Advisory Database
Aug 14, 2025
Reviewed
Aug 14, 2025
Withdrawn
Oct 3, 2025
Last updated
Oct 3, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-hmgh-466j-fx4c. This link is maintained to preserve external references.
Original Description
User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
References