{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-61913","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-10-03T22:21:59.614Z","datePublished":"2025-10-08T22:43:24.076Z","dateUpdated":"2025-10-14T14:18:13.859Z"},"containers":{"cna":{"title":"Flowise is vulnerable to arbitrary file read, arbitrary file write","problemTypes":[{"descriptions":[{"cweId":"CWE-22","lang":"en","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-jv9m-vf54-chjj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-jv9m-vf54-chjj"},{"name":"https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-j44m-5v8f-gc9c","tags":["x_refsource_MISC"],"url":"https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-j44m-5v8f-gc9c"},{"name":"https://github.com/FlowiseAI/Flowise/commit/1fb12cd93143592a18995f63b781d25b354d48a3","tags":["x_refsource_MISC"],"url":"https://github.com/FlowiseAI/Flowise/commit/1fb12cd93143592a18995f63b781d25b354d48a3"},{"name":"https://github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.8","tags":["x_refsource_MISC"],"url":"https://github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.8"}],"affected":[{"vendor":"FlowiseAI","product":"Flowise","versions":[{"version":"< 3.0.8","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-10-08T22:43:24.076Z"},"descriptions":[{"lang":"en","value":"Flowise is a drag & drop user interface to build a customized large language model flow. In versions prior to 3.0.8, WriteFileTool and ReadFileTool in Flowise do not restrict file path access, allowing authenticated attackers to exploit this vulnerability to read and write arbitrary files to any path in the file system, potentially leading to remote command execution. Flowise 3.0.8 fixes this vulnerability."}],"source":{"advisory":"GHSA-jv9m-vf54-chjj","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-jv9m-vf54-chjj","tags":["exploit"]},{"url":"https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-j44m-5v8f-gc9c","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-09T13:31:34.564762Z","id":"CVE-2025-61913","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-14T14:18:13.859Z"}}]}}