VYPR
High severityNVD Advisory· Published May 14, 2026· Updated May 14, 2026

FlowiseAI has Mass Assignment in Chatflow Update Endpoint that Allows Cross-Workspace AgentFlow Reassignment

CVE-2026-42863

Description

Summary

A Mass Assignment vulnerability exists in the chatflow update endpoint of FlowiseAI.

The endpoint allows clients to modify server-controlled properties such as deployed, isPublic, workspaceId, createdDate, and updatedDate when updating a chatflow object.

Due to missing server-side validation and authorization checks, an authenticated user can manipulate internal attributes of a chatflow and reassign it to another workspace. This allows cross-workspace resource reassignment and unauthorized modification of deployment and visibility settings.

Details

The endpoint responsible for updating chatflows:

PUT /api/v1/chatflows/{chatflowId}

accepts a JSON request body containing the chatflow configuration (flowData) along with other metadata fields.

However, the server does not restrict which properties may be modified by the client. As a result, user-controlled request bodies can include additional fields that should normally be controlled only by the backend.

Examples of server-controlled fields that can be manipulated include:

  1. deployed
  2. isPublic
  3. workspaceId
  4. createdDate
  5. updatedDate
  6. category
  7. type

These fields appear to be directly mapped to the underlying database entity when processing the update request, suggesting that the server performs a direct merge of the request body into the chatflow model without applying a strict DTO whitelist or authorization checks.

For example, modifying the request body with:

{
  "deployed": true,
  "isPublic": true,
  "createdDate": "1999-03-06T10:59:32.000Z",
  "updatedDate": "1999-03-06T13:21:34.000Z",
  "workspaceId": "11111111-2222-3333-4444-555555555555"
}

results in the server accepting and persisting these values.

In testing, a second workspace was created in the database and the workspaceId field was successfully modified through the API request. The chatflow was reassigned to the attacker-controlled workspace, confirming that the application does not enforce workspace ownership validation.

PoC

Authenticate to the Flowise interface.

Capture the request used to update a chatflow:

PUT /api/v1/chatflows/<CHATFLOW_ID>
Content-Type: application/json

Modify the request body by injecting additional fields:

{
  "name": "test-flow",
  "flowData": "{...}",
  "deployed": true,
  "isPublic": true,
  "workspaceId": "11111111-2222-3333-4444-555555555555"
}

Send the request.

Observe that the response returns the manipulated values:

{
  "deployed": true,
  "isPublic": true,
  "workspaceId": "11111111-2222-3333-4444-555555555555"
}

Verify in the database that the chatflow has been reassigned:

SELECT id, workspaceId FROM chat_flow WHERE id='<CHATFLOW_ID>';

The workspaceId value reflects the attacker-supplied workspace.

Impact

This vulnerability allows authenticated users to manipulate server-controlled attributes of chatflows.

Confirmed impacts include:

  • Unauthorized modification of chatflow visibility (isPublic)
  • Unauthorized deployment state changes (deployed)
  • Cross-workspace reassignment of chatflows (workspaceId)
  • Unauthorized modification of metadata (createdDate, updatedDate)

In multi-tenant environments, this allows an attacker to move chatflows between workspaces without authorization, breaking tenant isolation boundaries.

This may enable:

  • Cross-workspace workflow takeover
  • Unauthorized exposure of private workflows
  • Manipulation of deployed agent workflows

The issue stems from missing authorization checks and improper handling of client-controlled input in the chatflow update endpoint.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A mass assignment vulnerability in FlowiseAI's chatflow update endpoint allows authenticated users to modify protected fields and reassign chatflows cross-workspace, fixed in 3.1.2.

Vulnerability

A Mass Assignment vulnerability exists in the PUT /api/v1/chatflows/{chatflowId} endpoint of FlowiseAI [2]. The server does not restrict which properties may be modified by the client, allowing an authenticated user to manipulate server-controlled fields such as deployed, isPublic, workspaceId, createdDate, and updatedDate [2]. This occurs because the request body is directly merged into the chatflow model without a strict DTO whitelist or authorization checks [2]. Affected versions are those prior to Flowise 3.1.2 [1].

Exploitation

An attacker with a valid authenticated session can craft a PUT request to the chatflow update endpoint with a JSON body that includes additional fields not intended for client modification [2]. For example, inserting a workspaceId belonging to another workspace, along with deployed: true and isPublic: true, causes the server to persist these values without validating workspace ownership or field permissions [2]. The attack requires no special privileges beyond standard user authentication.

Impact

Successful exploitation allows cross-workspace resource reassignment, enabling an attacker to move a chatflow to a different workspace, and to modify its deployment and visibility settings (e.g., making it public or changing its creation date) [2]. This can lead to unauthorized disclosure of sensitive workflow logic, unauthorized access to chatflows, and potential privilege escalation within the application.

Mitigation

The vulnerability is fixed in Flowise version 3.1.2, released on the same day as the advisory [1]. Users should update to this version or later. No workarounds are documented in the available references. The fix includes proper server-side validation and authorization checks for the chatflow update endpoint [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
flowisenpm
< 3.1.23.1.2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.