INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 31m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 31m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 31m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 2h Global supply_chain Software Development and DevOps CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 6h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h
Vulnerabilities

CVE-2026-2097

High
Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution
CWE-434 — Weakness Type
Published: Feb 10, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

🤖 AI Executive Summary

Agentflow by Flowring contains a critical arbitrary file upload vulnerability (CVE-2026-2097) that allows authenticated attackers to upload malicious files and execute arbitrary code on affected servers. With a CVSS score of 8.8, this vulnerability poses a significant risk to organizations using Agentflow for workflow automation. While no public exploit is currently available, the vulnerability's severity and the availability of patches make immediate remediation essential for Saudi organizations.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 14:33
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability primarily impacts Saudi organizations in the following sectors: (1) Government agencies and ministries using Agentflow for document processing and workflow automation; (2) Banking and financial institutions (SAMA-regulated) utilizing Agentflow for transaction processing and administrative workflows; (3) Healthcare providers and MOH facilities using the platform for patient data management; (4) Energy sector organizations (ARAMCO, SAEC) employing Agentflow for operational automation; (5) Telecommunications companies (STC, Mobily, Zain) using the platform for service provisioning. The authenticated nature of the attack reduces immediate risk but poses severe insider threat and compromised credential scenarios. Successful exploitation could lead to data exfiltration, system compromise, and regulatory violations under NCA and SAMA frameworks.
🏢 Affected Saudi Sectors
Government and Public Administration Banking and Financial Services Healthcare and Medical Services Energy and Utilities Telecommunications Manufacturing and Industrial Education and Research
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all instances of Agentflow deployed across your organization using asset inventory and network scanning
2. Restrict access to Agentflow administrative interfaces to authorized personnel only; implement network segmentation
3. Review authentication logs for suspicious login patterns and unauthorized access attempts
4. Monitor file upload activities and review recently uploaded files for suspicious content

PATCHING GUIDANCE:
1. Apply the latest security patch from Flowring immediately upon availability confirmation
2. Test patches in a non-production environment before deployment
3. Implement a phased rollout across production systems with change management approval
4. Verify patch application by checking version numbers and security advisories

COMPENSATING CONTROLS (if patching is delayed):
1. Implement strict file upload validation: whitelist allowed file types (disable executable extensions: .exe, .sh, .php, .jsp, .asp)
2. Store uploaded files outside the web root directory
3. Disable script execution in upload directories via web server configuration (.htaccess or web.config)
4. Implement file integrity monitoring (FIM) on upload directories
5. Enforce principle of least privilege for service account permissions

DETECTION RULES:
1. Monitor for POST requests to file upload endpoints with suspicious file extensions
2. Alert on execution of recently uploaded files
3. Track failed authentication attempts followed by successful uploads
4. Monitor for web shell indicators: unusual process spawning from web server, reverse shell connections
5. Implement YARA rules to detect common web shell signatures in uploaded files
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع نسخ Agentflow المنتشرة عبر المنظمة باستخدام جرد الأصول والمسح الشبكي
2. تقييد الوصول إلى واجهات إدارة Agentflow للموظفين المصرحين فقط؛ تنفيذ تقسيم الشبكة
3. مراجعة سجلات المصادقة للبحث عن أنماط تسجيل دخول مريبة ومحاولات وصول غير مصرح بها
4. مراقبة أنشطة تحميل الملفات ومراجعة الملفات المحملة مؤخراً للبحث عن محتوى مريب

إرشادات التصحيح:
1. تطبيق أحدث تصحيح أمني من Flowring فوراً عند تأكيد التوفر
2. اختبار التصحيحات في بيئة غير إنتاجية قبل النشر
3. تنفيذ نشر متدرج عبر الأنظمة الإنتاجية مع موافقة إدارة التغيير
4. التحقق من تطبيق التصحيح بفحص أرقام الإصدار والمستشارات الأمنية

الضوابط البديلة (إذا تأخر التصحيح):
1. تنفيذ التحقق الصارم من تحميل الملفات: قائمة بيضاء بأنواع الملفات المسموحة (تعطيل الامتدادات القابلة للتنفيذ: .exe, .sh, .php, .jsp, .asp)
2. تخزين الملفات المحملة خارج دليل الويب الجذر
3. تعطيل تنفيذ البرامج النصية في أدلة التحميل عبر تكوين خادم الويب
4. تنفيذ مراقبة سلامة الملفات (FIM) على أدلة التحميل
5. فرض مبدأ أقل امتياز لأذونات حساب الخدمة

قواعد الكشف:
1. مراقبة طلبات POST إلى نقاط نهاية تحميل الملفات بامتدادات ملفات مريبة
2. التنبيه عند تنفيذ الملفات المحملة مؤخراً
3. تتبع محاولات المصادقة الفاشلة متبوعة بعمليات تحميل ناجحة
4. مراقبة مؤشرات قذيفة الويب: توليد عملية غير عادي من خادم الويب، اتصالات قذيفة عكسية
5. تنفيذ قواعد YARA للكشف عن توقيعات قذيفة الويب الشائعة في الملفات المحملة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.12.3.1 - Information and communication technology change management A.14.2.1 - Secure development policy A.14.2.5 - Secure development environment A.12.6.1 - Management of technical vulnerabilities
🔵 SAMA CSF
ID.RA-1 - Asset management and inventory PR.IP-1 - Security patch and vulnerability management PR.AC-1 - Access control and authentication DE.CM-8 - Vulnerability scanning and assessment
🟡 ISO 27001:2022
A.12.3.1 - Change management procedures A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development policy A.14.2.5 - Secure development environment A.12.2.1 - Capacity management
🟣 PCI DSS v4.0
6.2 - Security patches and updates 6.5.1 - Injection flaws prevention 11.2 - Vulnerability scanning
📦 Affected Products / CPE 1 entries
flowring:agentflow:-
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-434
EPSS0.24%
Exploit No
Patch ✓ Yes
Published 2026-02-10
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-434
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.