CVE-2025-59527
Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, a Server-Side Request Forgery (SSRF) vulnerability was discovered in the /api/v1/fetch-links endpoint of the Flowise application. This vulnerability allows an attacker to use the Flowise server as a proxy to access internal network web services and explore their link structures. This issue has been patched in version 3.0.6.
Vendor
Product
CWE
Yayın Tarihi
2025-09-22 20:15:39
Güncelleme
2025-09-23 16:47:43
Source Identifier
security-advisories@github.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/components/src/utils.ts#L474-L478
https://github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/controllers/fetch-links/index.ts#L6-L24
https://github.com/FlowiseAI/Flowise/blob/5930f1119c655bcf8d2200ae827a1f5b9fec81d0/packages/server/src/services/fetch-links/index.ts#L8-L18
https://github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.6
https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-hr92-4q35-4j3m