EXCLUSIVE: CRITICAL AI PLATFORM FLOWISE UNDER SIEGE AS HACKERS LAUNCH MASSIVE RCE ATTACK
A maximum-severity CYBERSECURITY crisis is unfolding in real-time, with threat actors actively exploiting a critical VULNERABILITY in the popular open-source Flowise AI platform. The flaw, tracked as CVE-2025-59528 and bearing a perfect 10.0 CVSS score, is a code injection bug enabling remote code execution. Shockingly, over 12,000 instances are currently exposed, creating a vast attack surface for MALWARE and RANSOMWARE deployment.
This is not a theoretical risk. Analysts at VulnCheck confirm active exploitation in the wild. The weakness resides in the platform's CustomMCP node, which handles user configuration. Attackers can weaponize this entry point to inject malicious code, effectively seizing control of entire systems. This ZERO-DAY scenario represents a nightmare for enterprise SECURITY teams, turning a tool for building AI agents into a gateway for catastrophic DATA BREACH.
"Once an attacker gains RCE, the entire server is compromised," warns a senior threat intelligence analyst familiar with the investigation. "This is a golden ticket for data exfiltration, crypto-mining operations, or as a foothold for lateral movement. The speed of this EXPLOIT campaign suggests it is highly automated, likely spreading via targeted PHISHING or scanning for unprotected instances."
Every organization using Flowise must act immediately. An unpatched instance is a sitting duck, potentially exposing sensitive AI models, internal data, and network credentials. In an era where BLOCKCHAIN SECURITY and digital assets are paramount, such a foundational breach can undermine entire operational and financial systems.
We predict a wave of ransomware attacks leveraging this flaw within the next 72 hours, as criminal groups rush to capitalize on the window before patches are universally applied.
The AI revolution has a glaring security flaw, and the hackers have found it first.



