⚠️ Active Threat Intelligence · 2026-04-08

Cybersecurity Intelligence Briefings

AI-synthesized from 50 sources · CVSS + EPSS + CISA KEV · Signal DNA · Vendor Risk

1 briefings 0 KEV-confirmed Updated 2026-04-08
⚡ Query all CVEs, KEV alerts & vendor risk via MCP APIcyber.mcp.brunosan.de →
CYBER Investigate exposed assets immediately. Apply network access controls as a primary workaround. Monitor vendor channels for an official patch and apply it as soon as it is released.CVE-2025-59528
Score 63/100 Risk 0.730 50 sources
CVE-2025-59528 in Flowise AI: Critical RCE with Reported Active Exploitation

CVE-2025-59528 in Flowise AI: Critical RCE with Reported Active Exploitation

BrunoSan Cyber Intelligence
TL;DR
  • A critical remote code execution (RCE) vulnerability, CVE-2025-59528, affects Flowise AI Agent Builder, assigned a CVSS score of 10.0.
  • Active exploitation is REPORTED in the wild. The vulnerability has a high EPSS score of 0.8239 (82.39th percentile), indicating a high probability of exploitation.
  • Immediate investigation of all publicly exposed Flowise AI instances is required. Restrict network access as a temporary mitigation pending a patch.
CVE-2025-59528 flowise-ai rce active-exploitation cvss-10
Full Analysis →