Description
Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_current_active_user dependency). However, the delete_api_key() CRUD function does NOT verify that the API key belongs to the current user before deletion.
Published: 2026-03-20
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized deletion of API keys
Action: Apply patch
AI Analysis

Impact

The vulnerability originates from the delete_api_key_route() endpoint in Langflow, which accepts an api_key_id parameter but only performs a generic authentication check. The underlying delete_api_key() function then deletes the key without confirming that it belongs to the requesting user. As a result, any authenticated user can delete any API key in the system, potentially denying access to other users' services and disrupting the operation of applications that rely on those keys. This is an instance of the CWE-639 "Authorization Bypass Using Privileged Credentials" weakness, and the effect is a loss of availability for services tied to the deleted keys.

Affected Systems

Langflow‑ai‘s Langflow product versions prior to 1.9.0 are affected. All releases before 1.9.0 that include the unverified delete_api_key_route() endpoint are vulnerable. Users of 1.9.0 and later can be considered safe from this issue.

Risk and Exploitability

With a CVSS score of 6.1, the vulnerability is classified as moderate severity. The EPSS score is less than 1 %, indicating a low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. An attacker must first authenticate to the application, but once logged in they can craft a request to the delete endpoint with any api_key_id value, making the attack fairly straightforward for a legitimate user or anyone who has obtained valid credentials. The lack of ownership verification removes a critical access control check, raising the risk for accidental or intentional service disruption.

Generated by OpenCVE AI on March 20, 2026 at 20:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Langflow version 1.9.0 or newer to eliminate the missing ownership verification bug.
  • If an upgrade cannot be performed immediately, configure your deployment to restrict or disable the delete API key endpoint for non‑administrative users.
  • Monitor logs for unusual or repetitive deletion attempts of API keys, especially those issued to other users.

Generated by OpenCVE AI on March 20, 2026 at 20:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rf6x-r45m-xv3w Langflow is Missing Ownership Verification in API Key Deletion (IDOR)
History

Fri, 20 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Langflow
Langflow langflow
Vendors & Products Langflow
Langflow langflow

Fri, 20 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_current_active_user dependency). However, the delete_api_key() CRUD function does NOT verify that the API key belongs to the current user before deletion.
Title Langflow has Missing Ownership Verification in API Key Deletion (IDOR)
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:L'}


Subscriptions

Langflow Langflow
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T18:07:41.668Z

Reserved: 2026-03-17T18:10:50.212Z

Link: CVE-2026-33053

cve-icon Vulnrichment

Updated: 2026-03-20T16:22:47.808Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T07:16:13.160

Modified: 2026-03-20T19:39:11.410

Link: CVE-2026-33053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:30:14Z

Weaknesses