High severity8.8NVD Advisory· Published Apr 23, 2026· Updated Apr 24, 2026
CVE-2026-41138
CVE-2026-41138
Description
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input is directly applied to the question parameter within the prompt template and it is reflected to the Python code without any sanitization. This vulnerability is fixed in 3.1.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
flowisenpm | < 3.1.0 | 3.1.0 |
flowise-componentsnpm | < 3.1.0 | 3.1.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/FlowiseAI/Flowise/security/advisories/GHSA-f228-chmx-v6j6nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-f228-chmx-v6j6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41138ghsaADVISORY
News mentions
0No linked articles in our index yet.