LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-41279

CVE-2026-41279 - Vulnerability Analysis

HighCVSS: 7.5

Last Updated: April 24, 2026

Flowise - Authentication Bypass

Published: April 23, 2026Updated: April 24, 2026PoC AvailableRemote Exploitable

Overview

Flowise < 3.1.0 contains an authentication bypass caused by a whitelisted text-to-speech generation endpoint accepting credentialId without chatflowId, letting remote attackers generate speech using decrypted stored credentials, exploit requires no authentication.

Severity & Score

Severity: High
CVSS Score: 7.5

Impact

Remote attackers can use stored credentials to generate speech, potentially abusing API keys and causing unauthorized actions.

Mitigation

Update to version 3.1.0 or later.

Details

CVE ID
CVE-2026-41279
Severity
High
CVSS Score
7.5
Type
broken_authentication
Status
confirmed

CWE

  • CWE-639

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H