VYPR

PyPI package

langflow

pkg:pypi/langflow

Vulnerabilities (23)

  • CVE-2026-42048CriMay 12, 2026
    affected < 1.9.0fixed 1.9.0

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to 1.9.0, Langflow is vulnerable to Path Traversal in the Knowledge Bases API (DELETE /api/v1/knowledge_bases). This occurs because user-supplied knowledge base names are concatenated directly in

  • CVE-2026-6599MedApr 20, 2026
    affected <= 1.8.3

    A vulnerability was detected in langflow-ai langflow up to 1.8.3. The impacted element is the function get_client_ip/install_mcp_config of the file src/backend/base/langflow/api/v1/mcp_projects.py of the component Model Context Protocol Configuration API. Performing a manipulatio

  • CVE-2026-6598MedApr 20, 2026
    affected < 1.9.1fixed 1.9.1

    A security vulnerability has been detected in langflow-ai langflow up to 1.8.3. The affected element is the function create_project/encrypt_auth_settings of the file src/backend/base/Langflow/api/v1/projects.py of the component Project Creation Endpoint. Such manipulation of the

  • CVE-2026-6597LowApr 20, 2026
    affected <= 1.8.3

    A weakness has been identified in langflow-ai langflow up to 1.8.3. Impacted is the function remove_api_keys/has_api_terms of the file src/backend/base/langflow/api/utils/core.py of the component Flow Using API. This manipulation causes unprotected storage of credentials. The att

  • CVE-2026-34046HigMar 27, 2026
    affected < 1.5.1fixed 1.5.1

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.5.1, the `_read_flow` helper in `src/backend/base/langflow/api/v1/flows.py` branched on the `AUTO_LOGIN` setting to decide whether to filter by `user_id`. When `AUTO_LOGIN` was `Fals

  • CVE-2026-33873CriMar 27, 2026
    affected < 1.9.0fixed 1.9.0

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.9.0, the Agentic Assistant feature in Langflow executes LLM-generated Python code during its validation phase. Although this phase appears intended to validate generated component co

  • CVE-2026-33497Mar 24, 2026
    affected < 1.7.1fixed 1.7.1

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters are not strictly filtered, which a

  • CVE-2026-33484Mar 24, 2026
    affected >= 1.0.0, <= 1.8.1

    Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without any authentication or ownership check. Any unauthenticated request with a known flo

  • CVE-2026-33309Mar 24, 2026
    affected >= 1.2.0, < 1.9.0fixed 1.9.0

    Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to the root architectural issue within `LocalStorageService` remaining unresolved. Be

  • CVE-2026-33053Mar 20, 2026
    affected < 1.7.2fixed 1.7.2

    Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_current_active_user dependency). Howeve

  • CVE-2026-33017CriKEVMar 20, 2026
    affected <= 1.8.2

    Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the en

  • CVE-2026-27966Feb 26, 2026
    affected <= 1.8.0rc2

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically exposes LangChain’s Python REPL tool (`python_repl_ast`). As a result, an attacker can

  • CVE-2026-0770Jan 23, 2026
    affected <= 1.7.3

    Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerabi

  • CVE-2026-21445Jan 2, 2026
    affected < 1.7.1fixed 1.7.1

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0.dev45, multiple critical API endpoints in Langflow are missing authentication controls. The issue allows any unauthenticated user to access sensitive user conversation data, tran

  • CVE-2025-68478Dec 19, 2025
    affected < 1.7.1fixed 1.7.1

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0, if an arbitrary path is specified in the request body's `fs_path`, the server serializes the Flow object into JSON and creates/overwrites a file at that path. There is no path r

  • CVE-2025-68477Dec 19, 2025
    affected < 1.7.1fixed 1.7.1

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0, Langflow provides an API Request component that can issue arbitrary HTTP requests within a flow. This component takes a user-supplied URL, performs only normalization and basic

  • CVE-2025-34291HigKEVDec 5, 2025
    affected <= 1.6.9

    Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite

  • CVE-2025-57760Aug 25, 2025
    affected < 1.5.1fixed 1.5.1

    Langflow is a tool for building and deploying AI-powered agents and workflows. A privilege escalation vulnerability exists in Langflow containers where an authenticated user with RCE access can invoke the internal CLI command langflow superuser to create a new administrative user

  • CVE-2025-3248KEVApr 7, 2025
    affected < 1.3.0fixed 1.3.0

    Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.

  • CVE-2024-48061Nov 4, 2024
    affected <= 1.0.18

    langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox.

Page 1 of 2