Skip to content

Commit 64f9335

Browse files
1 parent f4bd8d2 commit 64f9335

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

advisories/github-reviewed/2025/08/GHSA-q4xx-mc3q-23x8/GHSA-q4xx-mc3q-23x8.json

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q4xx-mc3q-23x8",
4-
"modified": "2025-08-14T16:42:36Z",
4+
"modified": "2025-10-03T21:50:37Z",
55
"published": "2025-08-14T12:30:22Z",
6-
"aliases": [
7-
"CVE-2025-55346"
8-
],
9-
"summary": "Flowise JS injection remote code execution",
10-
"details": "User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.",
6+
"withdrawn": "2025-10-03T21:50:37Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: Flowise vulnerable to RCE via Dynamic function constructor injection",
9+
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-hmgh-466j-fx4c. This link is maintained to preserve external references.\n\n### Original Description\nUser-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.",
1110
"severity": [
1211
{
1312
"type": "CVSS_V3",

0 commit comments

Comments
 (0)