-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
While no explicit code is available, the vulnerability centers on improper input handling in the /api/v1/get-upload-file endpoint. In Express.js applications, this would map to a route handler function. The CWE-400 classification suggests uncontrolled resource consumption, likely from processing malicious upload requests without validation. Confidence is medium due to lack of direct code references, but the endpoint mapping and vulnerability pattern strongly indicate the route handler as the vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| flowise | npm | <= 1.8.2 |
Ongoing coverage of React2Shell