Flowise Vulnerability Enables Remote Command Execution
A systemic design flaw in the Model Context Protocol (MCP) has enabled a critical remote code execution vector across Flowise and multiple AI frameworks. Researchers at OX Security disclosed that poor validation of user-supplied JavaScript and protocol-level parsing errors permit arbitrary command execution, exposing internal data, API keys, and file systems. The flaw is tracked by high-severity CVEs including CVE-2025-59528 with a CVSS 10.0 rating and affects official MCP SDKs across Python, Rust, Java, and TypeScript. Active exploitation and a broad supply-chain blast radius are reported, with dozens of products and hundreds of thousands of instances potentially impacted. Immediate mitigations: apply vendor patches, disable untrusted MCP adapters, restrict egress, and rotate exposed credentials.
What happened
Researchers at OX Security disclosed a systemic, architecture-level vulnerability in the Model Context Protocol, referenced as MCP, that enables unauthenticated remote command execution through poorly validated MCP adapters. The flaw allows injection of malicious JavaScript and protocol messages that escalate to Arbitrary Command Execution (RCE), impacting Flowise and a chain of AI frameworks and tools. A high-profile instance is CVE-2025-59528, assigned CVSS 10.0, and reports indicate active exploitation and a large blast radius across public and private deployments.
Technical details
The vulnerability arises from how MCP serializes and dispatches model context and adapter messages without sufficiently validating or sanitizing executable payloads. Attackers can leverage multiple exploitation vectors including unauthenticated UI injections, zero-click prompt injections in IDEs, and marketplace/package poisoning to inject payloads. Affected components include official MCP SDKs implemented in Python, Rust, Java, and TypeScript, and multiple downstream projects. Researchers enumerated several concrete CVEs across products, notably:
- •CVE-2025-59528 (Flowise, RCE, CVSS 10.0)
- •CVE-2025-65720 (GPT Researcher, unauthenticated UI injection)
- •CVE-2026-30624 (Agent Zero)
- •CVE-2026-30618 (Fay Framework)
- •CVE-2026-30617 (Langchain-Chatchat)
Some vulnerabilities have already been patched, for example in LiteLLM and Bisheng, while others remain open or under active attack.
Why it breaks assumptions
This is not a classical coding bug limited to a single repo; it is a protocol and adapter design choice that lets executable content traverse trust boundaries. That design makes downstream hardening difficult because developers implicitly inherit execution semantics when they adopt MCP adapters or SDKs. The result is a supply-chain style blast radius: researchers estimate large-scale exposure, citing usage metrics in the tens to hundreds of thousands of instances and package ecosystems with more than 150 million cumulative downloads across components.
Immediate mitigation guidance for practitioners
- •Patch first: Prioritize vendor patches and fixed releases for your dependencies. Apply updates for Flowise and any affected frameworks immediately.
- •Isolate adapters: Disable or remove untrusted MCP adapters and connectors until they are verified patched.
- •Egress and process control: Enforce network egress restrictions, container runtime policy, and disallow arbitrary shell execution from agent runtimes.
- •Secrets rotation: Rotate API keys, service tokens, and any credentials stored alongside agent contexts.
- •Audit and detection: Search code and infra for MCP usage, identify public endpoints, and monitor for anomalous process spawns, file writes, and unexpected outbound connections.
Context and significance
The vulnerability illustrates a new class of risk born from protocol-level trust assumptions in AI agent ecosystems. As agent orchestration and adapter ecosystems grow, implicit execution semantics create a high-risk supply chain that spans models, SDKs, developer tools, and marketplaces. This incident joins other systemic AI supply-chain incidents and will pressure protocol authors and platform vendors to harden message semantics, adopt allowlisting, and treat adapter inputs as untrusted by default. Reports indicate some vendors resist wholesale protocol redesigns, increasing urgency for downstream mitigations.
What to watch
Track vendor advisories and CVE updates for your stack, verify patches in all MCP SDK languages, and expect coordinated disclosures and hardened adapter specifications. Long term, teams should demand explicit execution contracts from protocol authors and prefer adapter patterns that separate data from executable content.
Scoring Rationale
This is a systemic, protocol-level vulnerability with active exploitation and a large supply-chain blast radius across SDKs and agent frameworks. It significantly raises operational risk for teams deploying agent architectures and requires urgent, coordinated mitigations.
Practice with real Retail & eCommerce data
90 SQL & Python problems · 15 industry datasets
250 free problems · No credit card
See all Retail & eCommerce problemsStep-by-step roadmaps from zero to job-ready — curated courses, salary data, and the exact learning order that gets you hired.



