← Back to feed

Flowise CVE-2025-59528 (CVSS 10.0): Critical RCE in AI Agent Builder Actively Exploited with 12,000+ Exposed Instances

Date: 2026-04-20
Tags: malicious-tool

Executive Summary

VulnCheck researchers detected the first confirmed in-the-wild exploitation activity from a Starlink IP address in early April 2026. Attackers are actively exploiting CVE-2025-59528, a maximum-severity remote code execution vulnerability in Flowise with a CVSS score of 10.0. Current internet scans identify between 12,000 and 15,000 Flowise instances exposed online.

Campaign Summary

FieldDetail
Campaign / MalwareFlowise RCE Exploitation Campaign
AttributionUnknown APT or independent threat actor (confidence: low)
TargetOrganizations using Flowise for AI agent/LLM applications; healthcare, finance, government potentially at risk
VectorUnauthenticated RCE via unsafe JavaScript evaluation in CustomMCP node; HTTP POST requests to vulnerable Flowise instances
Statusactive
First Observed2026-04-03

Detailed Findings

The flaw is located in the Flowise CustomMCP node, which allows users to configure connections to external Model Context Protocol (MCP) servers. The node evaluates the mcpServerConfig input parameter using unsafe JavaScript execution without first validating that the content is safe to run. An unauthenticated attacker who sends a crafted request to a vulnerable Flowise instance can execute arbitrary JavaScript and gain full system access, including the ability to read files from the host filesystem, access environment variables and API keys stored in the application, and execute system commands. Flowise instances commonly hold API keys for OpenAI, Anthropic, Azure OpenAI, and other LLM providers, as well as credentials for databases, vector stores, and internal business systems connected through the platform's integrations. An attacker who exploits CVE-2025-59528 on a Flowise instance gains access not just to the host system but to every downstream service whose credentials are configured in the application.

MITRE ATT&CK Mapping

TechniqueIDContext
Exploitation of Remote ServiceT1210Unauthenticated RCE via vulnerable CustomMCP node evaluation
Unsecured CredentialsT1552Harvesting LLM API keys and cloud credentials from Flowise configuration
Lateral MovementT1570Compromise of downstream services via stolen credentials

IOCs

Domains

_VulnCheck identified initial exploitation from Starlink IP. IOCs limited due to active campaign targeting broad instance base._

Full URL Paths

_VulnCheck identified initial exploitation from Starlink IP. IOCs limited due to active campaign targeting broad instance base._

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

flowise < 3.1.1

Detection Recommendations

Upgrade all Flowise deployments to version 3.1.1 immediately. If you are running version 3.0.5 or earlier, your instance is vulnerable. Monitor for: (1) HTTP POST requests to /api/v1/chatmessages with mcpServerConfig parameters containing JavaScript payload patterns; (2) Unusual process execution spawning from Flowise container/process (shell, curl, wget); (3) Outbound connections to LLM provider APIs or cloud credential endpoints immediately after exploitation; (4) Environment variable access patterns in application logs.

References