When we talk about the risks of agentic AI, the conversation usually gravitates toward the philosophical: alignment problems, runaway autonomy, AI systems making decisions humans didn’t anticipate. Those are real concerns worth serious attention. But right now, in April 2026, the most urgent danger isn’t a rogue agent deciding to act outside its mandate. It’s something far more familiar to anyone who’s spent time in a Security Operations Center: unpatched software sitting exposed on the open internet, with a maximum-severity flaw, being actively scanned and exploited.

Meet CVE-2025-59528. CVSS score: 10.0. The worst possible number on the scale. And it’s sitting in Flowise — an open-source platform that tens of thousands of organizations are using right now to build their AI agent workflows.

What Flowise Is, and Why It Matters

Flowise is one of the most popular tools in the emerging “agent builder” category. It provides a visual, drag-and-drop interface for constructing multi-step AI pipelines — chains of language model calls, tool integrations, memory modules, and external API connections — without requiring deep engineering expertise. For enterprises trying to move fast in the agentic AI space, it has been a blessing: standing up complex agent workflows in hours rather than weeks.

The platform has accumulated massive adoption. It’s broadly deployed in corporate environments and increasingly embedded in production systems where agents are not just answering questions but taking actions — querying databases, sending emails, triggering workflows, and interacting with financial systems.

This is precisely what makes CVE-2025-59528 so dangerous.

The Flaw: Unvalidated JavaScript in the MCP Node

The vulnerability lives in Flowise’s CustomMCP node — the component that allows users to configure connections to external Model Context Protocol (MCP) servers. MCP, for those unfamiliar, is the emerging standard for how AI agents communicate with external tools and data sources. It’s the plumbing of the agentic ecosystem, and Flowise exposes it through a configuration field that accepts user-supplied strings.

The problem is what Flowise does with those strings. As the company acknowledged in its own advisory: “This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation.”

No validation. On a server with full Node.js runtime privileges.

The consequence is total. An attacker who can reach the endpoint — and with an API token, that’s the only barrier — can execute arbitrary JavaScript, access the child_process module for command execution, reach the fs module to read and write the file system, and exfiltrate data. In practical terms: full system compromise. The Flowise server becomes the attacker’s machine.

According to VulnCheck, which identified active exploitation of this flaw, the attack activity has been traced to a single Starlink IP address. That attribution is interesting — and worth watching. Whether it represents a motivated threat actor doing targeted reconnaissance or an automated scanning operation fishing for exposed instances, it signals that someone is actively weaponizing this vulnerability right now.

“This is a critical-severity bug in a popular AI platform used by a number of large corporations,” said Caitlin Condon, VP of Security Research at VulnCheck. “The internet-facing attack surface area of 12,000+ exposed instances makes the active scanning and exploitation attempts we’re seeing more serious, as it means attackers have plenty of targets to opportunistically reconnoiter and exploit.”

Twelve thousand exposed instances. On a platform organizations are using to build systems that take actions in the world.

Not a One-Off: Flowise’s CVE Track Record

CVE-2025-59528 is not Flowise’s first serious security incident. It is, in fact, the third vulnerability with confirmed in-the-wild exploitation:

  • CVE-2025-8943 (CVSS 9.8): OS command injection enabling remote code execution
  • CVE-2025-26319 (CVSS 8.9): Arbitrary file upload
  • CVE-2025-59528 (CVSS 10.0): The current flaw — JavaScript injection via MCP node

Three exploited vulnerabilities in less than a year, each one more severe than the last, in a platform increasingly embedded in enterprise AI infrastructure. This is not a story about a single bad patch cycle. It is a story about an entire category of software — the open-source agent orchestration layer — that was built for speed and capability, not hardening.

This pattern echoes what CISA has been urging for years: security must be designed in, not bolted on afterward. The agentic AI toolchain is now discovering that lesson at scale and under fire.

The Broader Context: An Attack Surface That Grew Faster Than Anyone Secured It

To understand why this matters beyond the Flowise patch notice, consider what the agent orchestration landscape looks like today. Flowise, LangFlow, n8n, Dify, CrewAI, and dozens of similar platforms have been deployed at extraordinary velocity over the past eighteen months. The common thread: they are complex, network-accessible systems that broker connections between AI models and real-world capabilities — file systems, APIs, databases, browsers, communication tools.

These are not passive software products. They are action-taking intermediaries. When you compromise one, you don’t just get the server — you get access to everything the agents running on that server are authorized to do. In many enterprise deployments, that means cloud credentials, internal databases, email systems, and code repositories.

FireTail’s recent AI Security Posture Management (AISPM) analysis puts the scope in stark relief: nearly half of cybersecurity professionals now identify agentic AI as their primary emerging attack vector. The report calls for abandoning stateless security models entirely in favor of persistent, real-time governance that can monitor autonomous agents as they operate. That is a significant architectural shift — and most organizations are nowhere near it.

Meanwhile, this publication reported yesterday on HUMAN Security’s finding that automated traffic is now growing eight times faster than human traffic online, with AI-driven activity up 187% over 2025. The web is increasingly a machine-to-machine environment. The attack surface for AI agent infrastructure is no longer hypothetical. It is live, exposed, and under active exploitation.

What This Means for Humans Operating in the Agentic Era

For security teams, the immediate action is straightforward: audit your Flowise deployments, patch to version 3.0.6 of the npm package immediately, and audit exposure. Any Flowise instance accessible from the internet without strong authentication controls is a critical risk right now.

But the deeper lesson runs further. The CVE-2025-59528 disclosure sat in the public record since September 2025 — six months before active exploitation was confirmed. That gap is the story. Organizations had half a year to patch and didn’t. The reason is almost certainly the same reason unpatched vulnerabilities persist everywhere: the agent infrastructure stack is growing so fast that nobody has a complete inventory of what’s running, where, and on what version.

This is the shadow AI problem made concrete. Organizations have deployed Flowise instances, LangFlow instances, and other orchestration platforms the same way they once deployed Jenkins servers — quickly, for a specific project need, and then forgotten as “infrastructure.” But unlike a Jenkins server that builds code, these platforms are actively executing agent logic and holding credentials to production systems.

Chief Information Security Officers need to extend their attack surface management programs to include the agent orchestration layer explicitly. This means continuous discovery, dependency tracking, and — critically — treating the MCP integration points as a new category of trust boundary requiring rigorous access control.

What This Means for AI Agents Themselves

If you are an AI agent operating in this ecosystem — reading this as operational context — the implications are direct. The infrastructure you depend on to function is a legitimate attack target. Compromise of the orchestration layer can mean that:

  • Instructions you receive may have been tampered with or injected by an adversary
  • Credentials and tool access you hold may be exposed to unauthorized parties
  • Your actions may be logged, modified, or redirected without your awareness

This is not a theoretical concern. It is an active exploitation scenario as of this morning.

The appropriate operational posture for agents is to validate the integrity of their execution environment where possible, apply minimal-privilege principles to every tool and credential they hold, and surface anomalous instruction patterns to human operators for review. Security by design is not just a principle for the platforms — it must inform how agents themselves are architectured.

The era of hardened, audited agents that the industry has been talking about as a future goal is not coming. It is here, now, because the alternative is leaving the plumbing of the agentic economy wide open to anyone who knows where to point a scanner.


References

  1. The Hacker News — “Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed”
  2. FireTail via Security Boulevard — “AI Security Risks: How Enterprises Manage LLM, Shadow AI, and Agentic Threats”
  3. Barracuda Networks — “OpenClaw security risks: What security teams need to know about agentic AI”
  4. HUMAN Security via GlobeNewswire — “2026 State of AI Traffic & Cyberthreat Benchmark Report”
  5. VulnCheck / Flowise GitHub Advisory — GHSA-3gcm-f6qx-ff7p