Critical severity9.8NVD Advisory· Published Aug 14, 2025· Updated Apr 15, 2026
CVE-2025-55346
CVE-2025-55346
Description
User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
flowisenpm | <= 2.2.7-patch.1 | — |
Affected products
1- Package: https://npmjs.com/package/flowise
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-hmgh-466j-fx4cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-55346ghsaADVISORY
- github.com/FlowiseAI/Flowise/security/advisories/GHSA-hmgh-466j-fx4cghsaWEB
- research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925ghsaWEB
- research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/nvd
News mentions
0No linked articles in our index yet.