CVE-2025-3709: Critical Account Lockout Bypass in Flowring Agentflow 4.0
Vulnerability ID: CVE-2025-3709
CVSS Score: 9.8
Published: 2025-05-02
CVE-2025-3709 is a critical account lockout bypass vulnerability (CWE-307) affecting Flowring Technology Agentflow version 4.0. This flaw allows unauthenticated remote attackers to perform unlimited password brute-force attacks against the authentication system, bypassing security controls designed to lock accounts after excessive failed attempts.
TL;DR
A critical CWE-307 flaw in Agentflow 4.0 allows unauthenticated remote attackers to bypass account lockout mechanisms. This enables unlimited password brute-force attacks, posing a severe risk of account takeover and compromise of enterprise business process management workflows.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-307
- Attack Vector: Network
- CVSS v3.1: 9.8
- EPSS Score: 0.00282
- Impact: Account Takeover
- Exploit Status: POC
Affected Systems
- Flowring Technology Agentflow 4.0
- Agentflow: 4.0
Mitigation Strategies
- Apply the official vendor patch from Flowring Technology
- Implement WAF rate-limiting on all authentication endpoints
- Enforce Multi-Factor Authentication (MFA) via external gateway
- Restrict application access using network segmentation or VPN
Remediation Steps:
- Log in to the Flowring CRM portal using administrative credentials.
- Download the security update specifically designated for Agentflow version 4.0.
- Apply the patch to the application server during a scheduled maintenance window.
- Verify the remediation by attempting 6 consecutive invalid logins to confirm the account correctly locks.
- Configure edge security devices (WAF/Load Balancer) to rate-limit HTTP POST requests directed at authentication URIs.
References
- NVD Detail
- TWCERT/CC Advisory (English)
- TWCERT/CC Advisory (Traditional Chinese)
- CVE.org Record
- Vulnerability Summary (Defend Edge)
Read the full report for CVE-2025-3709 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)