Platform
nodejs
Component
flowise
Fixed in
3.0.5
3.0.8
CVE-2025-50538 describes a stored Cross-Site Scripting (XSS) vulnerability discovered in FlowiseAI. This vulnerability allows an attacker to inject arbitrary JavaScript code through the message input field. Successful exploitation could lead to credential theft and compromise of administrator accounts, particularly impacting users who view messages within the workflow UI. The vulnerability affects versions prior to 3.0.8 and a fix is available.
The impact of this XSS vulnerability is significant. An attacker can inject malicious JavaScript code that executes within the context of an administrator's browser session. This allows them to steal sensitive information, such as credentials stored in localStorage. The attacker could then use these stolen credentials to gain unauthorized access to the FlowiseAI system and potentially compromise the entire workflow infrastructure. The ability to execute arbitrary JavaScript provides a wide range of attack vectors, including keylogging, session hijacking, and defacement. This vulnerability highlights the importance of proper input sanitization and output encoding in web applications, especially those with administrative interfaces.
CVE-2025-50538 was publicly disclosed on 2025-10-03. As of this date, there is no indication of active exploitation campaigns targeting this vulnerability. Public proof-of-concept (POC) code is likely to emerge given the ease of exploitation associated with XSS vulnerabilities. The vulnerability's severity is classified as CRITICAL due to the potential for complete account compromise. It is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
0.08% (24% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-50538 is to upgrade FlowiseAI to version 3.0.8 or later, which includes the necessary fix. If an immediate upgrade is not possible, consider implementing temporary workarounds such as restricting access to the "View Messages" button in the workflow UI to trusted users only. Additionally, implement a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the message input field. Regularly review and update input validation routines to prevent similar vulnerabilities from being introduced in the future. After upgrading, confirm the fix by attempting to inject a simple JavaScript payload (e.g., <script>alert('XSS')</script>) through the message input and verifying that it does not execute.
Update Flowise to version 3.0.5 or higher. This version contains a fix for the XSS vulnerability. You can update via npm or by downloading the latest version from the official repository.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-50538 is a critical stored Cross-Site Scripting (XSS) vulnerability in FlowiseAI, allowing attackers to inject JavaScript code via message input, potentially stealing administrator credentials.
You are affected if you are using FlowiseAI versions prior to 3.0.8 and have administrator access to the workflow UI with the "View Messages" button.
Upgrade FlowiseAI to version 3.0.8 or later. As a temporary workaround, restrict access to the "View Messages" button.
As of 2025-10-03, there is no confirmed active exploitation, but public POCs are likely to emerge.
Refer to the FlowiseAI official security advisory for detailed information and updates: [https://flowiseai.com/security/advisories](https://flowiseai.com/security/advisories)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.