CVE-2026-41279
Flowise: Unauthenticated TTS endpoint accepts arbitrary credential IDs โ enables API credit abuse via stored credentials
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in the request body. When called without a chatflowId, the endpoint uses the provided credentialId to decrypt the stored credential (e.g., OpenAI or ElevenLabs API key) and generate speech. This vulnerability is fixed in 3.1.0.
| CWE | CWE-639 |
| Vendor | flowiseai |
| Product | flowise |
| Published | Apr 23, 2026 |
| Last Updated | Apr 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for flowiseai flowise
Be the first to know when new unknown vulnerabilities affecting flowiseai flowise are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
FlowiseAI / Flowise
< 3.1.0