Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input is directly applied to the question parameter within the prompt template and it is reflected to the Python code without any sanitization. This vulnerability is fixed in 3.1.0.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flowiseai
Flowiseai flowise |
|
| CPEs | cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Flowiseai
Flowiseai flowise |
|
| Metrics |
cvssV3_1
|
Thu, 23 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input is directly applied to the question parameter within the prompt template and it is reflected to the Python code without any sanitization. This vulnerability is fixed in 3.1.0. | |
| Title | Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-23T19:05:22.327Z
Updated: 2026-04-24T18:20:34.172Z
Reserved: 2026-04-17T12:59:15.738Z
Link: CVE-2026-41138
Updated: 2026-04-24T14:18:57.408Z
Status : Modified
Published: 2026-04-23T20:16:14.380
Modified: 2026-04-24T19:17:11.260
Link: CVE-2026-41138
No data.
ReportizFlow