CVE-2026-2096
Published: 10 February 2026
Summary
CVE-2026-2096 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Flowring Agentflow. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 46.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prohibits unauthenticated actions like reading, modifying, or deleting database contents through the vulnerable functionality.
Requires unique identification and authentication for non-organizational users, blocking unauthenticated remote attackers from exploiting the missing authentication.
Enforces approved access authorizations, ensuring authentication is required before allowing database read, modify, or delete operations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication enables unauthenticated remote exploitation of a public-facing application (T1190), granting arbitrary database read (T1213.006), modification (T1565.001), and deletion (T1485).
NVD Description
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
Deeper analysisAI
CVE-2026-2096 is a Missing Authentication vulnerability (CWE-288) in Agentflow, a product developed by Flowring. Published on 2026-02-10, it enables unauthenticated remote attackers to read, modify, and delete database contents through a specific functionality. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of required privileges or user interaction.
Unauthenticated attackers can exploit this vulnerability remotely over the network without any prerequisites. Successful exploitation grants full control over the database, allowing arbitrary read, modification, and deletion of contents, which could lead to complete data compromise, tampering, or destruction.
Mitigation guidance is detailed in advisories from the Flowring forum at https://forum.flowring.com/post/view?bid=72&id=45611&tpg=1&ppg=1&sty=1#45939 and TWCERT at https://www.twcert.org.tw/en/cp-139-10700-3534d-2.html and https://www.twcert.org.tw/tw/cp-132-10699-49c0b-1.html. Security practitioners should consult these sources for patches, workarounds, or configuration changes to address the issue.
Details
- CWE(s)