Description
Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters are not strictly filtered, which allows the secret_key to be read across directories. Version 1.7.1 contains a patch.
Published: 2026-03-24
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote File Read
Action: Patch
AI Analysis

Impact

The vulnerability occurs in the /profile_pictures/{folder_name}/{file_name} endpoint of Langflow, where the folder_name and file_name path parameters are not properly validated. This allows an attacker to input directory traversal sequences and read arbitrary files on the server, including sensitive files such as secret keys. The primary consequence is a confidentiality breach, granting unauthorized access to privileged configuration data and potentially enabling further compromise.

Affected Systems

Any installation of Langflow prior to version 1.7.1 is affected. The product is Langflow, an AI workflow and agent development platform distributed by langflow-ai. The path traversal flaw exists in the download_profile_picture function and has been fixed in release 1.7.1 and later.

Risk and Exploitability

The CVSS score is 8.7, indicating a high severity vulnerability. The EPSS score is not available, and the flaw is not listed in CISA’s KEV catalog. The exploit is straightforward for anyone who can reach the endpoint; a crafted HTTP request with path traversal segments will read files outside the intended folder. While the advisory does not detail authentication requirements, it is inferred that the endpoint may be publicly accessible or protected by existing authentication, so the risk depends on the deployment’s exposure. Nonetheless, the potential for unauthorized file read warrants urgent attention.

Generated by OpenCVE AI on March 24, 2026 at 20:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Langflow version 1.7.1 or later to apply the vendor patch.
  • Verify that the /profile_pictures endpoint is protected by appropriate authentication and access controls.
  • Restrict the file system permissions of the Langflow application user to prevent reading sensitive files outside the designated directories.
  • Monitor application logs for anomalous file access attempts, particularly those involving directory traversal patterns.

Generated by OpenCVE AI on March 24, 2026 at 20:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ph9w-r52h-28p7 langflow: /profile_pictures/{folder_name}/{file_name} endpoint file reading
History

Tue, 24 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Langflow
Langflow langflow
CPEs cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
Vendors & Products Langflow
Langflow langflow
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters are not strictly filtered, which allows the secret_key to be read across directories. Version 1.7.1 contains a patch.
Title Langflow: /profile_pictures/{folder_name}/{file_name} endpoint file reading
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Langflow Langflow
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T17:45:26.314Z

Reserved: 2026-03-20T16:59:08.887Z

Link: CVE-2026-33497

cve-icon Vulnrichment

Updated: 2026-03-24T17:45:22.226Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T14:16:30.780

Modified: 2026-03-24T19:20:25.140

Link: CVE-2026-33497

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:50:16Z

Weaknesses