Impact
Langflow’s disk cache service contains a vulnerability that allows remote attackers to trigger deserialization of untrusted data. The flaw arises because the service does not validate user‑supplied input before deserializing it. If an attacker can supply crafted data to the cache, they can run arbitrary code with the privileges of the service account. The issue requires the attacker to be authenticated, but once credentials are available, the code execution path is straightforward. According to CVSS, this flaw is scored 7.5, reflecting a high‑impact remote code execution scenario. This flaw falls under CWE‑502, indicating a deserialization vulnerability.
Affected Systems
The vulnerability is present in Langflow version 1.5.0 dev2. All installations running this exact release or earlier versions that have not applied the patch are susceptible. No other versions are listed as affected in the current advisory.
Risk and Exploitability
The CVSS score of 7.5 places this vulnerability in the high severity range, but its EPSS score of around 1% indicates a relatively low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been widely abused. Exploitability requires valid user credentials, meaning attackers need to compromise or impersonate an account with access to the disk cache. Even with authentication, the code runs with service‑account privileges, potentially giving the attacker full control over the deployment. Security teams should treat this as a high‑risk issue while monitoring for activity that matches the exploit pattern.
OpenCVE Enrichment