Critical Flowise AI Vulnerability Exploited, 15,000+ Instances Compromised
Severity: Critical (Score: 84.2)
Sources: Gbhackers, Cybersecuritynews
Summary
A maximum-severity remote code execution (RCE) vulnerability in Flowise, tracked as CVE-2025-59528, is being actively exploited by threat actors. This critical flaw allows attackers to execute arbitrary JavaScript code, leading to full system compromise. Over 15,000 instances of the open-source platform, used for building AI agents, are reportedly exposed. The vulnerability has a CVSS score of 10.0, indicating its severity. The flaw was published on September 22, 2025, and the first proof of concept (PoC) was released on November 27, 2025. Security researchers are urging immediate action to mitigate the risks associated with this vulnerability. Organizations using Flowise are at high risk and should prioritize patching and monitoring their systems. The ongoing exploitation highlights the urgent need for robust security measures in AI development platforms. Key Points: • CVE-2025-59528 is a critical RCE vulnerability in Flowise with a CVSS score of 10.0. • Over 15,000 instances of Flowise are currently exposed to exploitation. • Immediate action is required to mitigate risks associated with this vulnerability.
Key Entities
- Zero-day Exploit (attack_type)
- Flowise (platform)
- CVE-2025-59528 (cve)
- T1059 - Command and Scripting Interpreter (mitre_attack)
- Flowise AI Agent Builder Injection Vulnerability (vulnerability)
- Flowise Injection Vulnerability (vulnerability)