Description
IBM Langflow Desktop <=1.8.4 Langflow could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Published: 2026-04-30
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

IBM Langflow Desktop versions up to and including 1.8.4 contain a path‑traversal flaw in the file upload endpoint. A remote attacker who can send arbitrary HTTP requests to the service can embed directory‑separation sequences such as /../ in the URL path. The server resolves these sequences and exposes the contents of any file located on its file system, allowing the attacker to read sensitive data. The weakness corresponds to CWE‑22 and results in confidentiality compromise without granting code execution or modification rights.

Affected Systems

The vulnerability applies to IBM Langflow Desktop product versions 1.8.0 through 1.8.4, with the installed CPE specifically referencing version 1.8.4. The vendor confirms that upgrading to version 1.9.0 or newer eliminates the flaw.

Risk and Exploitability

The CVSS base score of 6.5 places the vulnerability in the medium severity range. EPSS data is not available, and the flaw is not listed in the CISA KEV catalog, indicating that large‑scale exploitation has not been reported. Based on the description, it is inferred that the attack vector is remote, requiring the ability to send crafted HTTP requests to the API service. The exploit does not need authentication or privileged access, so any host that accepts the download can be targeted. Because the flaw allows reading arbitrary files, it may expose credentials, configuration files, or other sensitive data, leading to confidentiality compromise.

Generated by OpenCVE AI on May 1, 2026 at 04:54 UTC.

Remediation

Vendor Solution

IBM recommends addressing the vulnerability now by upgrading to IBM Langflow Desktop 1.9.0 or newer https://www.langflow.org/blog/langflow-1-8-desktopIf you are already using Langflow Desktop, upgrade in the application to version 1.9.0To install Langflow Desktop for the first time, visit Download Langflow Desktop.


OpenCVE Recommended Actions

  • Upgrade IBM Langflow Desktop to version 1.9.0 or newer using the application’s built‑in update mechanism.
  • If an upgrade cannot be performed immediately, restrict network access to the API endpoint so that only trusted hosts can send requests.
  • After patching or access restrictions, monitor logs for anomalous URL patterns containing /../ that could indicate attempted exploitation.

Generated by OpenCVE AI on May 1, 2026 at 04:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description IBM Langflow Desktop <=1.8.4 Langflow could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Title Path Traversal and Arbitrary File Write Vulnerability in IBM Langflow Desktop API v2 File Upload Endpoint
First Time appeared Ibm
Ibm langflow Desktop
Weaknesses CWE-22
CPEs cpe:2.3:a:ibm:langflow_desktop:1.8.4:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm langflow Desktop
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Ibm Langflow Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-05-01T16:38:05.399Z

Reserved: 2026-02-27T16:01:04.253Z

Link: CVE-2026-3345

cve-icon Vulnrichment

Updated: 2026-05-01T16:38:00.844Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-30T22:16:25.337

Modified: 2026-05-01T15:27:15.287

Link: CVE-2026-3345

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T05:00:12Z

Weaknesses