GHSA-x2g5-fvc2-gqvp: Flowise has Insufficient Password Salt Rounds
Summary
Flowise uses an insufficiently weak password hashing setting where bcrypt (a password encryption algorithm) is configured with only 5 salt rounds, which provides just 32 iterations compared to OWASP's recommended minimum of 10 rounds (1024 iterations). This weakness means that if a database is stolen, attackers can crack user passwords roughly 30 times faster using modern GPUs, putting all user accounts at risk.
Solution / Mitigation
The source recommends increasing the default PASSWORD_SALT_HASH_ROUNDS environment variable to at least 10 (as recommended by OWASP), or considering 12 for a better balance between security and login performance. The source also recommends documenting that higher values will increase login time but improve security. Note: the source acknowledges that existing password hashes created with 5 rounds will remain vulnerable even after this change is applied.
Classification
Affected Vendors
Affected Packages
Related Issues
CVE-2024-27444: langchain_experimental (aka LangChain Experimental) in LangChain before 0.1.8 allows an attacker to bypass the CVE-2023-
CVE-2025-45150: Insecure permissions in LangChain-ChatGLM-Webui commit ef829 allows attackers to arbitrarily view and download sensitive
Original source: https://github.com/advisories/GHSA-x2g5-fvc2-gqvp
First tracked: March 5, 2026 at 07:00 PM
Classified by LLM (prompt v3) · confidence: 85%