Maximum-Severity RCE Vulnerability in Flowise Actively Exploited

A critical remote code execution vulnerability identified as CVE-2025-59528 in the open-source Flowise platform is now being actively exploited by hackers. Flowise is used for building custom large language model applications and agentic systems. The vulnerability permits attackers to execute arbitrary code, posing significant security risks to organizations using this technology.
What happened
Security researchers have reported active exploitation of a maximum-severity remote code execution vulnerability in Flowise, an open-source platform for developing custom LLM apps and agentic systems. The vulnerability is tracked as CVE-2025-59528 and allows attackers to execute arbitrary code on affected deployments.
Why it matters
As Flowise is employed to build custom large language model and agentic applications, this vulnerability's exploitation could enable attackers to gain unauthorized access and control over critical systems. The active exploitation indicates a pressing need for organizations using Flowise to address this security flaw promptly to avoid potential breaches.
Key technical details
The flaw is a remote code execution vulnerability that enables attackers to execute arbitrary code through the Flowise platform's features. It is rated as maximum severity, under the identifier CVE-2025-59528. The nature of the vulnerability relates to the open-source platform’s handling of user inputs or system operations, though exact technical specifics are not detailed in the source.
Affected organizations/products
The vulnerability affects the Flowise open-source platform used for building custom large language model applications and agentic systems.