{"data":{"id":"db5616eb-c907-46b3-93fe-9f055704457e","title":"CVE-2026-41274: Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GraphCypher","summary":"Flowise, a tool with a drag-and-drop interface for building customized AI workflows, has a vulnerability in versions before 3.1.0 where the GraphCypherQAChain node fails to properly clean user input before sending it to a Neo4j database (a graph database that stores connected data). An attacker could inject malicious Cypher commands (the query language for Neo4j) to steal, change, or delete data from the database.","solution":"This vulnerability is fixed in version 3.1.0. Users should update Flowise to version 3.1.0 or later.","labels":["security"],"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-41274","publishedAt":"2026-04-23T22:16:38.740Z","cveId":"CVE-2026-41274","cweIds":["CWE-943"],"cvssScore":null,"cvssSeverity":null,"severity":"critical","attackType":["rag_poisoning"],"issueType":"vulnerability","affectedPackages":null,"affectedVendors":["LangChain"],"affectedVendorsRaw":["Flowise"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0,"patchAvailable":null,"disclosureDate":"2026-04-23T22:16:38.740Z","capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["confidentiality","integrity","availability"],"aiComponentTargeted":"rag","llmSpecific":true,"classifierConfidence":0.92,"researchCategory":null,"atlasIds":["AML.T0020","AML.T0051.001"]}}