-
Couldn't load subscription status.
- Fork 210
Open
Labels
Contributor queueWhen a contributor has already one issue/PR in review, we put the following ones on hold with this.When a contributor has already one issue/PR in review, we put the following ones on hold with this.
Description
- Identifier of the vulnerability:
CVE-2025-55346 - Affected software: Flowise (npm package
flowise, affected versions <= 2.2.7-patch.1) - Type of vulnerability: Dynamic Function constructor / Eval injection → Remote Code Execution
- Requires authentication: No
- Language you would use for writing the plugin: Templated plugins
- Resources:
- GitHub Advisory – GHSA-hmgh-466j-fx4c: GHSA-hmgh-466j-fx4c
- NVD – CVE-2025-55346: https://nvd.nist.gov/vuln/detail/CVE-2025-55346
- JFrog research writeup: https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/
- OSV entry: https://osv.dev/vulnerability/GHSA-hmgh-466j-fx4c
Metadata
Metadata
Assignees
Labels
Contributor queueWhen a contributor has already one issue/PR in review, we put the following ones on hold with this.When a contributor has already one issue/PR in review, we put the following ones on hold with this.