Impact
A flaw in the handling of the exec_globals parameter provided to the validate endpoint allows an attacker to include code from an untrusted control sphere. This omission enables the execution of arbitrary commands without requiring authentication, potentially allowing the attacker to run code as the system’s root user.
Affected Systems
Langflow’s Langflow application, specifically version 1.4.2, is impacted. No other versions are listed in the provided data.
Risk and Exploitability
The vulnerability scores 9.8 on the CVSS scale, indicating a critical impact. With an EPSS score of 0.11859%, the likelihood of exploitation is very low. The vulnerability is not currently recorded in the CISA KEV catalog. Attackers can exploit the flaw remotely by sending a specially crafted request to the validate endpoint, with no authentication required.
OpenCVE Enrichment
Github GHSA