Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, Flowise trusts any HTTP client that sets the header x-request-from: internal, allowing an authenticated tenant session to bypass all /api/v1/** authorization checks. With only a browser cookie, a low-privilege tenant can invoke internal administration endpoints (API key management, credential stores, custom function execution, etc.), effectively escalating privilege. This issue has been patched in version 3.0.13.
Use CWE-863, Flowiseai vendor hub and Flowise product page to widen CVE-2026-30820 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-41268, CVE-2026-41278 and CVE-2026-41271 for nearby disclosures in the same product family.