Skip to content

Flowise affected by Server-Side Request Forgery (SSRF) in HTTP Node Leading to Internal Network Access

High severity GitHub Reviewed Published Mar 9, 2026 in FlowiseAI/Flowise • Updated Mar 11, 2026

Package

npm flowise (npm)

Affected versions

<= 3.0.12

Patched versions

3.0.13

Description

Description:
Flowise exposes an HTTP Node in AgentFlow and Chatflow that performs server-side HTTP requests using user-controlled URLs. By default, there are no restrictions on target hosts, including private/internal IP ranges (RFC 1918), localhost, or cloud metadata endpoints.
This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force the Flowise server to make requests to internal network resources that are inaccessible from the public internet.

Impact includes:

  • Access to internal admin panels (e.g., internal company dashboards, Jenkins, Kubernetes API, etc.).
  • Retrieval of cloud provider metadata (e.g., AWS IMDSv1 at [http://169.254.169.254], GCP, Azure).
  • Port scanning and enumeration of internal services.
  • Potential lateral movement or privilege escalation in compromised environments.

This vulnerability is particularly severe because:

  • Flowise instances are often deployed publicly without authentication (FLOWISE_USERNAME/PASSWORD not set by default).
  • The HTTP Node is easily accessible in simple flows with minimal configuration.

Proof of Concept (PoC):
A minimal flow consisting of three nodes demonstrates successful internal network access:
Flow Structure:
image
HTTP Node Configuration:
The HTTP Node is configured to perform a GET request to an internal address on localhost:
URL: http://127.0.0.1:8000 (or any internal service)
image

Successful Response from Internal Service:
When the flow is triggered via chat input, the Flowise server successfully retrieves and returns content from the internal mock server running on port 8000 within the same container/network:
image

Impact
This is a Server-Side Request Forgery (SSRF) vulnerability with both read and write capabilities.
The HTTP Request node supports all standard HTTP methods (GET, POST, PUT, PATCH, DELETE), allowing attackers to not only retrieve sensitive information but also modify, create, or delete data on internal services if those services expose mutable endpoints:

  • Read access: Retrieval of sensitive internal data, cloud provider metadata (e.g., AWS IAM credentials at http://169.254.169.254/latest/meta-data/iam/security-credentials/), secrets, configuration files, or database contents.
  • Write access: Modification or deletion of internal resources via POST/PUT/PATCH/DELETE methods (e.g., creating malicious users/configurations, overwriting files, deleting data, triggering destructive actions on internal admin panels, CI/CD systems like Jenkins, Kubernetes APIs, or cloud management interfaces).
    Amplification: Retrieved cloud credentials can be used for further privilege escalation or lateral movement outside the n8n instance.

Suggested Long-term Fix (for Flowise):

  • Add optional security controls to HTTP Node:
  • Toggle: "Block private IP ranges and localhost" (enabled by default).
  • Field: "Allowed domains" (whitelist).
  • Display prominent warning when URL field uses template variables (e.g., {{ }}).
  • Update documentation with explicit SSRF risks and best practices.

References

@igor-magun-wd igor-magun-wd published to FlowiseAI/Flowise Mar 9, 2026
Published by the National Vulnerability Database Mar 10, 2026
Published to the GitHub Advisory Database Mar 11, 2026
Reviewed Mar 11, 2026
Last updated Mar 11, 2026

Severity

High

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(15th percentile)

Weaknesses

Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. Learn more on MITRE.

CVE ID

CVE-2026-31829

GHSA ID

GHSA-fvcw-9w9r-pxc7

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.