Cyber Posture

CVE-2026-30824

CriticalPublic PoC

Published: 07 March 2026

Published
07 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1222 93.9th percentile
Risk Priority 27 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse a container administration service to execute commands within a container.

Security Summary

CVE-2026-30824 is a critical authentication bypass vulnerability (CWE-306) in Flowise, an open-source drag-and-drop user interface for building customized large language model (LLM) flows. In versions prior to 3.0.13, the NVIDIA NIM router endpoints (/api/v1/nvidia-nim/*) are whitelisted in the global authentication middleware, enabling unauthenticated access to privileged container management and token generation functions. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to complete lack of authentication controls on sensitive endpoints.

Any unauthenticated attacker with network access to a vulnerable Flowise instance can exploit this issue remotely with low complexity and no user interaction required. Successful exploitation grants access to privileged operations, including container management and token generation, potentially allowing full compromise of the confidentiality, integrity, and availability of the affected system through arbitrary code execution, data exfiltration, or persistent control.

The issue was addressed in Flowise version 3.0.13, as detailed in the project's release notes and security advisory. Security practitioners should upgrade to this version or later to mitigate the vulnerability, with further details available in the GitHub security advisory (GHSA-5f53-522j-j454) and release tag (flowise@3.0.13).

Flowise's focus on LLM orchestration introduces AI/ML relevance, as exploited instances could disrupt or hijack model inference pipelines integrated with NVIDIA NIM containers. No public evidence of real-world exploitation has been reported as of the CVE publication on 2026-03-07.

Details

CWE(s)
CWE-306

Affected Products

flowiseai
flowise
≤ 3.0.13

AI Security Analysis

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: large language model

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1609 Container Administration Command Execution
Adversaries may abuse a container administration service to execute commands within a container.
Why these techniques?

The vulnerability is an authentication bypass in a public-facing web application (Flowise API endpoints), enabling unauthenticated remote exploitation (T1190). It directly grants access to privileged container management functions, facilitating container administration commands (T1609).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References