CVE-2026-41275: Flowise: Password Reset Link Sent Over Unsecured HTTP
(updated )
Summary: The password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user (e.g., public Wi-Fi) can intercept the reset link and gain unauthorized access to the victim’s account.
Steps to Reproduce:
- Sign up for a new account on https://cloud.flowiseai.com/register.
- Navigate to the https://cloud.flowiseai.com/forgot-password page and enter your email.
- Open your inbox and locate the password reset email.
- Copy the reset link and inspect its protocol – it uses http:// instead of https://.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-41275 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →