A critical vulnerability in the Flowise low-code platform has been exploited by hackers, allowing them to inject malicious JavaScript code into thousands of AI workflows. The flaw, rated as max-severity, is attributed to a design oversight in the platform's custom MCP node, which enables connectivity between AI agents and external tools. As a result, nearly 15,000 Flowise instances have been exposed, with threat actors already leveraging the vulnerability to insert arbitrary JavaScript code1. The exploitation of this flaw poses significant risks to organizations relying on Flowise for building custom large language models and agentic systems. The vulnerability highlights the importance of securing low-code platforms, which are increasingly being used to develop and deploy AI-powered applications. This vulnerability matters to practitioners because it underscores the need for rigorous security testing and validation of low-code platforms to prevent similar exploits.
Hackers exploit a critical Flowise flaw affecting thousands of AI workflows
⚠️ Critical Alert
Why This Matters
Threat actors have found a way to inject arbitrary JavaScript into the Flowise low-code platform for building custom LLM and agentic systems.
References
- CSO Online. (2026, April 8). Hackers exploit a critical Flowise flaw affecting thousands of AI workflows. CSO Online. https://www.csoonline.com/article/4155680/hackers-exploit-a-critical-flowise-flaw-affecting-thousands-of-ai-workflows.html
Original Source
CSO Online
Read original →