プラットフォーム
nodejs
コンポーネント
flowise
修正版
3.0.5
3.0.8
CVE-2025-50538 describes a stored Cross-Site Scripting (XSS) vulnerability discovered in FlowiseAI. This vulnerability allows an attacker to inject arbitrary JavaScript code through the message input field. Successful exploitation could lead to credential theft and compromise of administrator accounts, particularly impacting users who view messages within the workflow UI. The vulnerability affects versions prior to 3.0.8 and a fix is available.
The impact of this XSS vulnerability is significant. An attacker can inject malicious JavaScript code that executes within the context of an administrator's browser session. This allows them to steal sensitive information, such as credentials stored in localStorage. The attacker could then use these stolen credentials to gain unauthorized access to the FlowiseAI system and potentially compromise the entire workflow infrastructure. The ability to execute arbitrary JavaScript provides a wide range of attack vectors, including keylogging, session hijacking, and defacement. This vulnerability highlights the importance of proper input sanitization and output encoding in web applications, especially those with administrative interfaces.
CVE-2025-50538 was publicly disclosed on 2025-10-03. As of this date, there is no indication of active exploitation campaigns targeting this vulnerability. Public proof-of-concept (POC) code is likely to emerge given the ease of exploitation associated with XSS vulnerabilities. The vulnerability's severity is classified as CRITICAL due to the potential for complete account compromise. It is not currently listed on the CISA KEV catalog.
Organizations utilizing FlowiseAI for workflow automation, particularly those with administrator accounts that have access to the "View Messages" feature, are at risk. Shared hosting environments where multiple users share the same FlowiseAI instance are also particularly vulnerable, as a compromised user could potentially exploit this vulnerability to impact other users.
• nodejs / server:
grep -r '<iframe srcdoc="' /opt/flowiseai/node_modules• generic web:
curl -I 'http://your-flowiseai-instance/admin/messages' | grep 'X-XSS-Protection'• generic web:
Review access and error logs for suspicious requests containing <script> or <iframe tags targeting the message input endpoint.
disclosure
エクスプロイト状況
EPSS
0.08% (24% パーセンタイル)
CISA SSVC
CVSS ベクトル
The primary mitigation for CVE-2025-50538 is to upgrade FlowiseAI to version 3.0.8 or later, which includes the necessary fix. If an immediate upgrade is not possible, consider implementing temporary workarounds such as restricting access to the "View Messages" button in the workflow UI to trusted users only. Additionally, implement a Web Application Firewall (WAF) with rules to detect and block XSS payloads targeting the message input field. Regularly review and update input validation routines to prevent similar vulnerabilities from being introduced in the future. After upgrading, confirm the fix by attempting to inject a simple JavaScript payload (e.g., <script>alert('XSS')</script>) through the message input and verifying that it does not execute.
Flowise をバージョン 3.0.5 以降にアップデートしてください。このバージョンには XSS 脆弱性に対する修正が含まれています。npm 経由でアップデートするか、公式リポジトリから最新バージョンをダウンロードできます。
脆弱性分析と重要アラートをメールでお届けします。
CVE-2025-50538 is a critical stored Cross-Site Scripting (XSS) vulnerability in FlowiseAI, allowing attackers to inject JavaScript code via message input, potentially stealing administrator credentials.
You are affected if you are using FlowiseAI versions prior to 3.0.8 and have administrator access to the workflow UI with the "View Messages" button.
Upgrade FlowiseAI to version 3.0.8 or later. As a temporary workaround, restrict access to the "View Messages" button.
As of 2025-10-03, there is no confirmed active exploitation, but public POCs are likely to emerge.
Refer to the FlowiseAI official security advisory for detailed information and updates: [https://flowiseai.com/security/advisories](https://flowiseai.com/security/advisories)