TokenMix Research Lab · 2026-04-29

Flowise MCP RCE: 10 Fixes for CVE-2026-40933 and Upsonic

Flowise MCP RCE: 10 Fixes for CVE-2026-40933 and Upsonic

Last Updated: 2026-04-29
Author: TokenMix Research Lab

Flowise MCP RCE is no longer a theoretical protocol debate. CVE-2026-40933 gives Flowise a critical authenticated RCE path through MCP adapters, and Upsonic CVE-2026-30625 shows the same failure mode in another agent framework.

The short version: patch Flowise to 3.1.0 or later, patch Upsonic to 0.72.0 or later, and do not treat input sanitization as the control boundary for MCP STDIO. Based on the GitHub Advisory Database entry for CVE-2026-40933, Flowise versions up to 3.0.13 are affected and 3.1.0 is patched. Based on Snyk's Upsonic advisory, Upsonic versions before 0.72.0 are affected. OX Security's April 27 analysis says both projects tried to reduce risk through sanitization, but argument-level execution behavior still bypassed that approach.

For the broader MCP threat background, read TokenMix.ai's MCP security flaw guide and MCP protocol guide. This article is the patch-focused version for teams running Flowise, Upsonic, or similar MCP-enabled agent servers.

Table of Contents

Quick Verdict

Flowise CVE-2026-40933 is a patch-now issue. Upsonic CVE-2026-30625 is a patch-now issue. The broader lesson is stronger: MCP STDIO should be treated as process execution, not a harmless plugin configuration.

Question Short answer Confidence
Is Flowise affected? Yes, Flowise and flowise-components up to 3.0.13 are affected; 3.1.0 is patched per GitHub Advisory Database. High
Is Upsonic affected? Yes, versions before 0.72.0 are affected per Snyk. High
Is this only a Flowise bug? No. OX frames it as an MCP supply-chain pattern around STDIO command execution. High
Is input sanitization enough? No. OX's follow-up shows sanitization can be bypassed through allowed command arguments. High
Should public MCP admin UIs stay online? No. Put them behind authentication, network controls, and audit logging. High

Why This Topic Has Ranking Potential

The best SEO target here is not broad "MCP security." That keyword is already crowded. The better target is the incident cluster: Flowise MCP RCE fix, CVE-2026-40933 patch, Upsonic CVE-2026-30625, MCP STDIO sanitization bypass, and AI agent server hardening.

Hotspot Search intent Competition Why it can rank
GPT-5.5 / Spud Broad model news, pricing, benchmarks High TokenMix already has several GPT-5.5 pages.
DeepSeek V4 Model review, API pricing, open weights High TokenMix already covers V4 deeply.
MCP RCE broad story News and protocol-risk explainer Medium-high TokenMix already has a broad MCP security article.
Flowise CVE-2026-40933 fix Patch guide, affected versions, remediation Low-medium Fresh, specific, high urgency.
Upsonic CVE-2026-30625 Patch guide, MCP task hardening Low Sparse coverage and strong security intent.

TokenMix.ai's read: the highest-probability page is a specific fix guide, not another news recap. Developers searching CVE numbers are usually closer to action. They want versions, controls, and a checklist.

What Actually Broke

The bug class is direct input-to-process execution through MCP STDIO configuration. That phrase matters. STDIO MCP servers are not just data connectors. They can start local or server-side processes.

According to the Flowise GitHub advisory, the Flowise issue sits in Custom MCP configuration: an authenticated user can add an MCP stdio server with arbitrary command behavior. The patched version is 3.1.0. According to Snyk's Upsonic advisory, Upsonic before 0.72.0 is vulnerable through MCP server task creation.

The key twist is that the vulnerable systems were not doing nothing. OX's April 27 write-up says Flowise and Upsonic attempted command filtering and special-character restrictions, but allowed command arguments could still reach OS-level execution paths.

Layer What teams thought it did What failed Safer interpretation
UI authentication Keeps random outsiders away Authenticated users can still be attackers or compromised accounts Necessary, not sufficient
Command allowlist Allows only known binaries Allowed binaries can receive dangerous arguments Treat args as code-adjacent
Special-character filtering Blocks obvious shell chains Execution can happen without obvious separators Not a security boundary
MCP STDIO Plugin transport Process-launch surface Sandbox and govern it
Agent workflow Productivity layer Privileged automation path Needs AppSec controls

Affected Versions and Patch Status

Use this table as the first production triage pass.

Product CVE Affected versions Fixed version / mitigation Source
Flowise CVE-2026-40933 Flowise up to 3.0.13 Upgrade to Flowise 3.1.0 or later GitHub Advisory
flowise-components CVE-2026-40933 flowise-components up to 3.0.13 Upgrade to 3.1.0 or later GitHub Advisory
Upsonic CVE-2026-30625 Versions before 0.72.0 Upgrade to 0.72.0 or later Snyk
LiteLLM CVE-2026-30623 1.74.2 to before 1.83.7 Upgrade to 1.83.7 or later Snyk LiteLLM advisory
Windsurf CVE-2026-30615 Reported by OX as prompt-injection to MCP config RCE Check vendor update status before using MCP with untrusted content OX full advisory

This is a live security area. Version numbers above reflect public advisories available on April 29, 2026. Re-check vendor advisories before freezing a production exception.

The 10 Controls That Matter

The fix is not "add a regex." The fix is to stop treating MCP STDIO as a trusted configuration field.

# Control Why it matters Priority
1 Patch Flowise and Upsonic immediately Removes known vulnerable code paths P0
2 Disable Custom MCP STDIO by default Eliminates the risky transport path for most users P0
3 Put MCP admin UIs behind SSO and network allowlists Reduces exposed attack surface P0
4 Run MCP servers in isolated containers or sandboxes Limits file, network, and credential access after compromise P0
5 Deny arbitrary command and args fields Prevents user-controlled process launch P0
6 Use per-user RBAC for agent tool creation Stops normal users from adding privileged tools P1
7 Separate agent runtime secrets from admin secrets Limits API-key loss if the runtime is compromised P1
8 Log MCP server creation, edits, and process starts Makes incident response possible P1
9 Use a private registry for approved MCP tools Reduces package and marketplace supply-chain risk P1
10 Add runtime egress controls Blocks reverse shells, data exfiltration, and crypto-mining paths P1

The official MCP security best practices already emphasize authorization, session handling, scope minimization, and token handling. The Flowise/Upsonic lesson adds a practical rule: if an MCP feature can launch a process, it needs the same controls you would apply to a CI runner or plugin execution host.

Priority Matrix for Production Teams

If you run Flowise or Upsonic internally, treat this as a two-hour triage followed by a two-day hardening sprint.

Environment Exposure First action Follow-up
Public Flowise UI High Remove public access and patch to 3.1.0+ Review all Custom MCP entries
Internal Flowise with many users High Patch and restrict MCP creation to admins Add audit logs and RBAC
Upsonic agent framework High Patch to 0.72.0+ Review MCP tasks for process execution
LiteLLM with MCP preview endpoints Medium-high Patch to 1.83.7+ Disable unused MCP management endpoints
Local developer MCP setup Medium Remove untrusted MCP configs Separate work and personal credentials
Read-only HTTP MCP servers Lower Verify auth and scopes Add request logging and egress limits

This is where many teams underreact. Internal does not mean safe. Agents usually hold API keys, repository access, cloud tokens, database credentials, or vector database credentials. A private agent server with weak MCP controls can be more valuable than a public marketing site.

Cost and Blast Radius Math

Security pages rank better when they answer the operator's real question: "How bad is this for my environment?" Use these formulas for an MCP security checklist review without inventing fake breach costs.

Risk calculation Formula What it tells you
Estimated remediation hours (MCP hosts x 2) + (workspaces x 0.5) + (public admin UIs x 1) First-pass patch, config review, and access lockdown effort
Secret rotation scope runtime secrets + provider API keys + database credentials + vector DB tokens How much work starts if compromise is suspected
Blast radius score public MCP admins + writable repos + reachable secret stores + outbound internet paths Whether this is a local issue or a platform incident
Runtime isolation gap MCP tools with process execution - sandboxed MCP tools How many servers still need container or VM isolation

The formula is intentionally simple. It is not a compliance model. It is a fast way to decide whether the incident is a one-host patch or a platform-wide agent server hardening sprint.

Scenario 1: Small Team

Assumption Value
Developers with access 8
MCP-enabled agent servers 2
API keys reachable from runtime 6
Time to patch and review 4 hours
Time to recover from leaked keys 1-2 days

For a small team, the estimated cost is mostly engineering time. The remediation formula gives (2 hosts x 2) + (1 workspace x 0.5) + (1 public admin UI x 1) = 5.5 hours before secret review. That is still cheaper than a full key rotation, GitHub audit, and cloud log search after a suspected command injection incident.

Scenario 2: Agency or SaaS Team

Assumption Value
Client workspaces 20
Agent servers or builders 5
Secrets per workspace 5-20
If compromised Cross-client exposure risk
Best control Tenant-isolated runtime + private MCP registry

The agency risk is not only RCE. It is cross-client blast radius. A conservative secret rotation scope is 20 workspaces x 5 secrets = 100 credentials at the low end. One compromised Flowise or Upsonic host can expose multiple customer API keys if runtime secrets are shared.

Scenario 3: Enterprise AI Platform

Assumption Value
Internal MCP tools 50+
Agent users 500+
Registry sources Multiple
Admin UI exposure Often wider than intended
Best control Central policy gateway + egress monitoring

At enterprise scale, the hardening job is governance. If only 20% of 50 internal MCP tools can launch local processes, the runtime isolation gap is 10 tools. A single patch does not solve unreviewed MCP tool sprawl. TokenMix.ai's recommendation is to inventory MCP servers the same way you inventory production APIs.

How to Hardening-Test an MCP Deployment

Do not test this by running public exploit payloads. Test the controls.

Test Expected safe result
Can a normal user create a Custom MCP STDIO server? No
Can any MCP config include arbitrary command and args fields? No
Can the runtime read production API keys by default? No
Can the MCP runtime reach the public internet freely? No
Are MCP config changes logged with user identity and timestamp? Yes
Are approved MCP tools pinned by source and version? Yes
Is every public MCP admin UI behind SSO or VPN? Yes
Can you rotate agent runtime credentials in under 30 minutes? Yes

If the answer is wrong on the first four tests, patching alone is not enough. You still have a process-execution surface exposed to agent workflows.

Related Articles

FAQ

What is the Flowise MCP RCE vulnerability?

Flowise CVE-2026-40933 is an authenticated remote code execution vulnerability in MCP adapter handling. The GitHub advisory says Flowise and flowise-components up to 3.0.13 are affected, with 3.1.0 listed as patched.

How do I fix CVE-2026-40933 in Flowise?

Upgrade Flowise and flowise-components to 3.1.0 or later. Then review Custom MCP configurations, restrict MCP creation to trusted admins, and remove public access to Flowise admin surfaces.

What is Upsonic CVE-2026-30625?

Upsonic CVE-2026-30625 is an arbitrary code injection issue tied to MCP server task creation. Snyk says affected versions are before 0.72.0 and recommends upgrading to 0.72.0 or higher.

Is input sanitization enough for MCP STDIO?

No. OX's Flowise/Upsonic analysis shows that sanitization and approved command lists can still be bypassed through command arguments. Treat STDIO as process execution and isolate it accordingly.

Is this a problem with MCP itself or only with Flowise?

Both layers matter. Flowise and Upsonic have concrete patched CVEs, but OX describes the broader issue as an MCP STDIO supply-chain pattern. Any product that lets users configure STDIO commands needs strict controls.

Should I disable MCP entirely?

Not necessarily. Disable Custom MCP STDIO where it is not needed, keep approved MCP tools, and run them inside isolated runtimes. MCP is useful, but it should not get unchecked process-launch privileges.

What is the best immediate checklist?

Patch affected packages, remove public admin access, disable arbitrary STDIO configuration, rotate exposed runtime secrets if compromise is suspected, and add logs for MCP server creation and edits.

How does TokenMix.ai fit into MCP security planning?

TokenMix.ai is not a security scanner. The relevant architecture point is routing: keep AI model access behind one controlled API layer, separate model keys from agent runtime secrets, and avoid spreading provider credentials across every MCP server.

Sources