Impact
Langflow, an AI‑workflow application, has multiple critical API endpoints that lack authentication. The flaw allows attackers who are not logged in to read sensitive conversation data, view transaction histories, and execute destructive actions such as deleting messages. This can lead to major confidentiality and integrity violations, exposing personal data and disrupting user workflows. The underlying weakness is a missing authentication control (CWE‑306).
Affected Systems
The vulnerability affects the langflow‑ai:langflow product on all releases prior to 1.7.0.dev45. System administrators should verify the version installed in their environment and be aware that any deployment of the unpatched application is susceptible to these attacks.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity. An EPSS of 7% suggests that exploitation is plausible but not ubiquitous. The vulnerability is not listed in the CISA KEV catalog. The attack vector is most likely remote, with unauthenticated HTTP requests made to the exposed API endpoints. Successful exploitation requires network connectivity to the service and can be performed by any internet user without credentials.
OpenCVE Enrichment
Github GHSA