GHSA-c995-4fw3-j39m – langflow
Package
Manager: pip
Name: langflow
Vulnerable Version: <0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Langflow Vulnerable to Code Injection via the `/api/v1/validate/code` endpoint ### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-rvqx-wpfh-mfx7. This link is maintained to preserve external references. ### Original Description Langflow versions prior to 1.3.0 are susceptible to code injection in the `/api/v1/validate/code` endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
Metadata
Created: 2025-04-07T15:31:22Z
Modified: 2025-06-17T20:13:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-c995-4fw3-j39m/GHSA-c995-4fw3-j39m.json
CWE IDs: ["CWE-306", "CWE-94"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0