logo

GHSA-c995-4fw3-j39m langflow

Package

Manager: pip
Name: langflow
Vulnerable Version: <0

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: N/A

EPSS: N/A pctlN/A

Details

Duplicate Advisory: Langflow Vulnerable to Code Injection via the `/api/v1/validate/code` endpoint ### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-rvqx-wpfh-mfx7. This link is maintained to preserve external references. ### Original Description Langflow versions prior to 1.3.0 are susceptible to code injection in the `/api/v1/validate/code` endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.

Metadata

Created: 2025-04-07T15:31:22Z
Modified: 2025-06-17T20:13:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-c995-4fw3-j39m/GHSA-c995-4fw3-j39m.json
CWE IDs: ["CWE-306", "CWE-94"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0