CVE-2026-43995
Summary
Flowise introduced SSRF protections through a centralized HTTP security wrapper (httpSecurity.ts) that implements deny-list validation and IP pinning logic.
However, multiple tool implementations directly import and invoke raw HTTP clients (node-fetch, axiosInstead of using the secured wrapper.
Because enforcement is neither mandatory nor centralized, these tools bypass SSRF mitigation entirely, restoring full SSRF capability even after the patch.
This issue is distinct from specification trust issues and represents incomplete mitigation of previously addressed SSRF vulnerabilities.
Details
Intended Security Model:
All outbound HTTP requests should pass through the centralized validation layer implemented in:
packages/components/src/httpSecurity.tsThis layer performs:
HTTPDENYLISTenforcement- IP resolution validation
- IP pinning
- Loopback blocking
Observed Implementation Gap:
Multiple tools bypass this layer and import HTTP libraries directly.
Examples include:
packages/components/nodes/tools/OpenAPIToolkit/OpenAPIToolkit.tspackages/components/nodes/tools/WebScraperTool/WebScraperTool.tspackages/components/nodes/tools/MCP/core.tspackages/components/nodes/tools/Arxiv/core.ts
These files directly execute:
importfetchfrom'node-fetch'or invoke axios without passing through the centralized validation wrapper.
Because there is no global interceptor or enforcement mechanism, outbound requests in these components are executed without SSRF validation.
This renders the mitigation introduced in GHSA-2x8m-83vc-6wv4 incomplete.
Root Cause
Security enforcement is not centralized.
Outbound request validation depends on voluntary usage of a wrapper function rather than being structurally enforced.
Because direct imports of HTTP clients are allowed, the mitigation is easily bypassed.
This is an architectural enforcement failure rather than a single implementation bug.
PoC
Even when an administrator configures:
HTTP_DENY_LIST=169.254.0.0/16,127.0.0.0/8The following attack succeeds if a vulnerable tool is enabled:
Chat Prompt:
Use the Web Scraper tool to retrieve:
http://169.254.169.254/latest/meta-data/iam/security-credentials/Execution flow:
- The LLM triggers
WebScraperTool. - The tool calls raw
fetch()directly. - No
httpSecurity.tsvalidation is applied. - The request reaches the metadata endpoint.
- The response is returned to the chat context.
This demonstrates that SSRF protection is opt-in rather than enforced.
Impact
Severity: Critical (CVSS v3.1: 9.1 – AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
This issue:
- Completely bypasses the centralized SSRF mitigation.
- Allows access to internal network resources.
- Enables the exploitation of cloud metadata and credential theft.
- Invalidates the security assumptions of the recent patch.
Any deployment enabling affected tools remains vulnerable.
Recommended Remediation
- Refactor all tools to use the centralized
secureFetch()wrapper. - Add ESLint
no-restricted-importsrules to prohibit the direct usage ofnode-fetchoraxiosin tool components. - Consider implementing a single internal HTTP client abstraction layer.
- Apply network-level egress filtering as defense-in-depth.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-qqvm-66q4-vf5c, https://nvd.nist.gov/vuln/detail/CVE-2026-43995, https://github.com/FlowiseAI/Flowise
