CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-21445
8.8

Langflow Unchained: Open Gates and Path Traversals in the AI Pipeline

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 2, 2026·6 min read·13 visits

PoC Available

Executive Summary (TL;DR)

The Langflow dev team forgot to lock the front door. Critical API endpoints—including log streams and user creation—lacked authentication checks. Combined with a path traversal vulnerability in the profile picture handler, unauthenticated attackers could fully compromise the instance, steal OpenAI/Anthropic keys, and exfiltrate server files.

Langflow, a popular visual framework for building AI agents, shipped with critical endpoints completely exposed to unauthenticated users. This vulnerability allowed attackers to stream live application logs (leaking API keys), create administrative users, and read arbitrary files via directory traversal.

Official Patches

LangflowGitHub Commit fixing the vulnerabilities

Fix Analysis (1)

Technical Appendix

CVSS Score
8.8/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P

Affected Systems

Langflow AI Agent Builder

Affected Versions Detail

Product
Affected Versions
Fixed Version
Langflow
langflow-ai
< 1.7.0.dev451.7.0.dev45
AttributeDetail
CWE IDCWE-306 (Missing Authentication)
Secondary CWECWE-22 (Path Traversal)
CVSS v4.08.8 (High)
Attack VectorNetwork
Privileges RequiredNone
ImpactCritical (Data Leakage, RCE potential)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1078Valid Accounts
Defense Evasion
T1005Data from Local System
Collection
CWE-306
Missing Authentication for Critical Function

The software does not prove that a claim of identity is correct when that claim is used to execute a critical function.

Known Exploits & Detection

Manual AnalysisDirect API manipulation via curl allows admin creation and log streaming.
NucleiDetection Template Available

Vulnerability Timeline

Vulnerability Published and Patched
2026-01-02

References & Sources

  • [1]GHSA-c5cp-vx83-jhqx Advisory
  • [2]NVD Entry

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.