CVE-2026-41279 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: April 24, 2026
Flowise - Authentication Bypass
Published: April 23, 2026Updated: April 24, 2026PoC AvailableRemote Exploitable
Overview
Flowise < 3.1.0 contains an authentication bypass caused by a whitelisted text-to-speech generation endpoint accepting credentialId without chatflowId, letting remote attackers generate speech using decrypted stored credentials, exploit requires no authentication.
Severity & Score
Severity: High
CVSS Score: 7.5
Impact
Remote attackers can use stored credentials to generate speech, potentially abusing API keys and causing unauthorized actions.
Mitigation
Update to version 3.1.0 or later.
Related Resources
Details
- CVE ID
- CVE-2026-41279
- Severity
- High
- CVSS Score
- 7.5
- Type
- broken_authentication
- Status
- confirmed
CWE
- CWE-639
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H