CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Active exploitation of maximum-severity code injection flaw in Flowise AI agent builder (CVE-2025-59528, CVSS 10.0)

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Threat actors are actively exploiting CVE-2025-59528, a maximum-severity (CVSS 10.0) code injection vulnerability in Flowise, an open-source AI agent builder platform. The flaw allows unauthenticated remote code execution via the CustomMCP node, which parses user-supplied mcpServerConfig strings without sanitization, enabling execution of arbitrary JavaScript code with full Node.js runtime privileges. Successful exploitation grants attackers access to dangerous modules (e.g., child_process, fs), leading to full system compromise, arbitrary command execution, file system access, and sensitive data exfiltration.

Timeline

  1. 07.04.2026 08:56 1 articles · 2h ago

    Maximum-severity code injection flaw in Flowise AI agent builder exploited in the wild (CVE-2025-59528)

    Active exploitation of CVE-2025-59528, a CVSS 10.0 code injection flaw in Flowise’s CustomMCP node, has been observed in the wild. The vulnerability allows unauthenticated remote code execution via unsanitized user input in mcpServerConfig strings, granting attackers full system access and control. Exploitation activity has been traced to a single Starlink IP address targeting at least 12,000 exposed Flowise instances, highlighting widespread exposure and the opportunistic nature of the campaign.

    Show sources

Information Snippets