CVE-2026-30820 PUBLISHED

Flowise Authorization Bypass via Spoofed x-request-from Header

Assigner: GitHub_M
Reserved: 05.03.2026 Published: 07.03.2026 Updated: 07.03.2026

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, Flowise trusts any HTTP client that sets the header x-request-from: internal, allowing an authenticated tenant session to bypass all /api/v1/** authorization checks. With only a browser cookie, a low-privilege tenant can invoke internal administration endpoints (API key management, credential stores, custom function execution, etc.), effectively escalating privilege. This issue has been patched in version 3.0.13.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor FlowiseAI
Product Flowise
Versions
  • Version < 3.0.13 is affected

References

Problem Types

  • CWE-863: Incorrect Authorization CWE