CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-36421

Medium Severity
Flowiseai
SVRS
30/100

CVSSv3
7.5/10

EPSS
0.00052/1

CVE-2024-36421 impacts Flowise, a drag-and-drop interface for building custom large language model flows. This vulnerability stems from a CORS misconfiguration, allowing arbitrary origins to connect to the website and potentially steal user information. The Access-Control-Allow-Origin header is set to allow all origins in version 1.4.3. While the CVSS score is 7.5, the SOCRadar Vulnerability Risk Score (SVRS) is 30. This vulnerability can be chained with a path injection to enable unauthorized file access from the Flowise server. The unrestricted CORS policy, even in default unauthenticated configurations, can lead to significant data breaches. Given the potential for data theft and unauthorized access, this vulnerability poses a substantial risk to Flowise users. Note that as of the publication date, no known patches are available.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:N
A:N
2024-07-01

2024-07-03

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-36421 | FlowiseAI Flowise up to 1.4.3 origin validation (GHSL-2023-232)
vuldb.com2024-07-01
CVE-2024-36421 | FlowiseAI Flowise up to 1.4.3 origin validation (GHSL-2023-232) | A vulnerability, which was classified as problematic, has been found in FlowiseAI Flowise up to 1.4.3. This issue affects some unknown processing. The manipulation leads to origin validation error. The identification of this vulnerability is CVE-2024-36421. The attack may be initiated remotely. There is no exploit available. It is recommended to apply a patch to
cve-2024-36421
domains
urls
cves

Social Media

GHSL-2023-232_GHSL-2023-234: Path injection, Cross-Site Scripting (XSS) and CORS misconfiguration in Flowise - CVE-2024-36420, CVE-2024-36421, CVE-2024-36422, CVE-2024-36423, CVE-2024-37145, CVE-2024-37146 https://t.co/Ut6PTJdKvI
0
0
3

Affected Software

Configuration 1
TypeVendorProduct
AppFlowiseaiflowise

References

ReferenceLink
[email protected]https://github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.ts#L122
[email protected]https://securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/

CWE Details

CWE IDCWE NameDescription
CWE-346Origin Validation ErrorThe software does not properly verify that the source of data or communication is valid.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence