CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-C2C9-MFW7-P8HW
5.3

GHSA-C2C9-MFW7-P8HW: Cross-Workspace Chatflow Disclosure in Flowise

Amit Schendel
Amit Schendel
Senior Security Researcher

May 21, 2026·4 min read·3 visits

PoC Available

Executive Summary (TL;DR)

Flowise <= 3.1.1 contains a flaw in API key authorization where a valid API key from any workspace can be used to read all unprotected chatflows from all other workspaces on the same instance. Administrators must upgrade to version 3.1.2 to resolve this data leakage.

An Incorrect Authorization vulnerability in Flowise versions up to 3.1.1 allows cross-workspace information disclosure. The `/api/v1/chatflows/apikey/:apikey` endpoint fails to scope database queries by workspace, exposing unprotected chatflow configurations, LLM prompts, and application metadata across the entire instance.

Vulnerability Overview

Flowise is an open-source low-code platform for building custom Large Language Model (LLM) applications. It supports multi-tenant environments through workspaces, utilizing API keys to segment access and execution rights. This architecture is designed to isolate chatflows and prevent cross-tenant data exposure.

GHSA-C2C9-MFW7-P8HW represents an Incorrect Authorization vulnerability (CWE-863) within this multi-tenant isolation mechanism. The flaw specifically affects the /api/v1/chatflows/apikey/:apikey endpoint, which client applications use to retrieve necessary configuration data for specific chat components.

In versions prior to 3.1.2, this endpoint fails to enforce strict workspace boundaries. An authenticated user belonging to one workspace can exploit this endpoint to disclose chatflow designs across the entire Flowise instance, provided those chatflows do not have explicit individual passwords configured.

Root Cause Analysis

The vulnerability stems from missing database query scoping. When a client application makes a request to the affected endpoint, it supplies an API key in the URL path. The Flowise backend receives this key and validates its format and active status.

However, the authorization check terminates prematurely. While the backend confirms the API key is active, it fails to extract the workspaceId associated with that specific key to use in the subsequent data retrieval phase. The resulting database query constructs a search for chatflows using only the "unprotected" status as the primary filter condition.

Because the workspaceId is omitted from the WHERE clause of the database query, the execution engine returns every unprotected chatflow present in the instance. The system then serializes this unrestricted result set and returns it to the client, effectively bypassing the intended multi-tenant authorization logic.

Attack Flow Execution

Exploitation of this vulnerability requires network access to the target Flowise instance and possession of at least one valid API key. This key can belong to a low-privileged workspace, making this an attack vector for lateral data discovery within shared development or production environments.

The attacker crafts an HTTP GET request directed at the vulnerable endpoint, substituting the :apikey parameter with their legitimate key. The request requires no complex payloads, special headers, or specific instance misconfigurations to execute successfully.

curl -X GET "https://flowise.example.com/api/v1/chatflows/apikey/sk-attacker-valid-key" \
     -H "Accept: application/json"

The resulting JSON response contains an array of chatflow objects. These objects include full structural details, node configurations, and prompt templates for applications belonging to entirely separate, unrelated workspaces.

Attack Methodology Diagram

The following sequence illustrates how the logic flaw causes data leakage across tenant boundaries.

Impact Assessment

The primary impact is unauthorized information disclosure affecting the confidentiality of AI agent designs. While the vulnerability is read-only and does not permit modification or deletion of resources, the leaked data often contains highly sensitive intellectual property.

Exposed chatflows reveal the precise system prompts, retrieval-augmented generation (RAG) configurations, and logic pathways designed by other users. This exposes proprietary prompt engineering techniques and internal business logic that application owners intend to keep confidential.

Furthermore, if developers have improperly embedded hardcoded secrets, API keys for external services (like OpenAI, Anthropic, or vector databases), or sensitive metadata directly into their unprotected chatflow nodes, these credentials will be exposed to the attacker, escalating the overall severity of the breach.

Remediation and Mitigation

Administrators must upgrade all Flowise deployments to version 3.1.2 or later. The patch modifies the backend controller logic to explicitly extract the workspaceId linked to the provided API key and appends it as a mandatory filter parameter in the underlying database query.

If immediate patching is not technically feasible, administrators can temporarily mitigate the risk by configuring network-level access controls or Web Application Firewall (WAF) rules. Restricting access to the /api/v1/chatflows/apikey/ endpoint to trusted internal IP addresses prevents external lateral exploitation.

Additionally, ensuring that all individual chatflows are configured with explicit password protection will prevent them from being returned by the vulnerable query. The flaw specifically targets chatflows that rely solely on workspace boundaries for access control rather than explicit individual protection mechanisms.

Technical Appendix

CVSS Score
5.3/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Systems

Flowise <= 3.1.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
Flowise
FlowiseAI
<= 3.1.13.1.2
AttributeDetail
CWE IDCWE-863 (Incorrect Authorization)
Attack VectorNetwork / Remote
CVSS Score5.3 (Medium)
Privileges RequiredLow (Valid API Key)
ImpactCross-Workspace Information Disclosure
Exploit StatusProof of Concept available

MITRE ATT&CK Mapping

T1580Cloud Infrastructure Discovery
Discovery
T1010Application Window Discovery
Discovery
CWE-863
Incorrect Authorization

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.

Vulnerability Timeline

Public Disclosure Date
2025-05-20

References & Sources

  • [1]GitHub Security Advisory
  • [2]Flowise Security Overview
  • [3]OSV Database Entry
  • [4]GitLab Advisory Database

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.