#VU125528 Use of Password Hash With Insufficient Computational Effort in Flowise
Published: April 9, 2026
Flowise
FlowiseAI
Description
The vulnerability allows a local privileged user to disclose sensitive information.
The vulnerability exists due to use of password hash with insufficient computational effort in the password hashing utility when generating bcrypt password hashes with the default salt rounds setting. A local privileged user can obtain password hashes and perform brute-force cracking to disclose sensitive information.
Existing password hashes generated with the weak default remain more susceptible to offline cracking if a database compromise occurs.