{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T04:29:08.995","vulnerabilities":[{"cve":{"id":"CVE-2026-30823","sourceIdentifier":"security-advisories@github.com","published":"2026-03-07T06:16:10.007","lastModified":"2026-03-11T13:36:25.867","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, there is an IDOR vulnerability, leading to account takeover and enterprise feature bypass via SSO configuration. This issue has been patched in version 3.0.13."},{"lang":"es","value":"Flowise es una interfaz de usuario de arrastrar y soltar para construir un flujo de modelo de lenguaje grande personalizado. Antes de la versión 3.0.13, existe una vulnerabilidad IDOR, que conduce a la toma de control de cuentas y a la elusión de funciones empresariales a través de la configuración de SSO. Este problema ha sido parcheado en la versión 3.0.13."}],"metrics":{"cvssMetricV30":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"},{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:flowiseai:flowise:*:*:*:*:*:*:*:*","versionEndExcluding":"3.0.13","matchCriteriaId":"8C6D6D18-106F-49FE-B523-B5DCAADFB40F"}]}]}],"references":[{"url":"https://github.com/FlowiseAI/Flowise/releases/tag/flowise%403.0.13","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-cwc3-p92j-g7qm","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}