
"The CustomMCP node allows users to input configuration settings for connecting to an external MCP (Model Context Protocol) server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation."
"Successful exploitation of the vulnerability can allow access to dangerous modules such as child_process (command execution) and fs (file system), as it runs with full Node.js runtime privileges."
"As only an API token is required, this poses an extreme security risk to business continuity and customer data."
"This is a critical-severity bug in a popular AI platform used by a number of large corporations."
Flowise, an open-source AI platform, has a maximum-severity vulnerability (CVE-2025-59528) that allows remote code execution due to a code injection flaw. This vulnerability enables threat actors to execute arbitrary JavaScript code on the server, compromising the system and allowing access to sensitive data. The flaw requires only an API token for exploitation, significantly threatening business operations. The issue was reported by Kim SooHyun and addressed in version 3.0.6. Exploitation activity has been traced to a single Starlink IP address, marking it as a critical concern for users.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]