Active Exploitation of Critical RCE Vulnerability in Flowise AI Platform

Security researchers at VulnCheck reveal that threat actors are actively exploiting CVE-2025-59528, a critical remote code execution vulnerability in the open-source AI platform Flowise. The flaw, stemming from unsafe configuration inputs in the CustomMCP node, affects over 12,000 publicly exposed instances.
What happened
VulnCheck discovered that CVE-2025-59528, a maximum-severity code injection vulnerability with a CVSS score of 10.0, is being actively exploited in Flowise. This vulnerability allows attackers to execute arbitrary code remotely by leveraging the CustomMCP node's configuration input functionality.
Why it matters
Flowise is an open-source artificial intelligence platform, and the presence of a remote code execution vulnerability with active exploitation poses significant risks. Compromise of exposed instances could lead to unauthorized control, affecting organizations using this platform for AI-related tasks.
Key technical details
The vulnerability resides in the CustomMCP node, which permits users to input configuration settings for connections. Improper handling of these inputs results in code injection, enabling remote attackers to execute arbitrary code on affected systems. The vulnerability is tracked as CVE-2025-59528 with a CVSS score of 10.0.
Affected organizations/products
The vulnerability impacts Flowise installations, with over 12,000 instances publicly exposed and susceptible to exploitation.
Source attribution
https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html