Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0ycTR3LXg4aDItMmZ2aM4AA--Q
Flowise Authentication Bypass vulnerability
An Authentication Bypass vulnerability exists in Flowise version 1.8.2. This could allow a remote, unauthenticated attacker to access API endpoints as an administrator and allow them to access restricted functionality.
Permalink: https://github.com/advisories/GHSA-2q4w-x8h2-2fvhJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0ycTR3LXg4aDItMmZ2aM4AA--Q
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 3 months ago
Updated: 3 months ago
CVSS Score: 7.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Identifiers: GHSA-2q4w-x8h2-2fvh, CVE-2024-8181
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-8181
- https://tenable.com/security/research/tra-2024-22-0
- https://tenable.com/security/research/tra-2024-33
- https://github.com/advisories/GHSA-2q4w-x8h2-2fvh
Affected Packages
npm:flowise
Dependent packages: 0Dependent repositories: 1
Downloads: 9,548 last month
Affected Version Ranges: <= 1.8.2
No known fixed version
All affected versions: 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11, 1.2.12, 1.2.13, 1.2.14, 1.2.15, 1.2.16, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.3.7, 1.3.8, 1.3.9, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.4.8, 1.4.9, 1.4.10, 1.4.11, 1.4.12, 1.5.0, 1.5.1, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.6.5, 1.6.6, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.8.2