The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
Use CWE-306, Flowiseai vendor hub and Flowise product page to widen CVE-2025-8943 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-41268, CVE-2026-41278 and CVE-2026-41271 for nearby disclosures in the same product family.