Impact
A vulnerability in Langflow allows anyone to download image files from a tenant without providing authentication. The /api/v1/files/images/{flow_id}/{file_name} endpoint serves requested images without verifying the requestor’s identity or whether the image belongs to the attendee. This flaw enables attackers to collect visual data that may contain sensitive content, violating confidentiality and potentially enabling further reconnaissance.
Affected Systems
The flaw affects all Langflow releases from 1.0.0 up to 1.8.1, which are provided by langflow‑ai. The 1.9.0 release includes a patch that enforces authentication checks on the image download route.
Risk and Exploitability
The CVSS score of 7.5 signals a high severity vulnerability. No EPSS data is reported, and the issue is not included in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires only an unauthenticated HTTP GET request once the attacker knows or can guess the flow_id and file_name, which are often exposed through other API outcomes. The low barrier to attack and the potential to expose all tenants’ uploaded images make this flaw a significant risk in a multi‑tenant deployment.
OpenCVE Enrichment
Github GHSA