Impact
Langflow versions before 1.9.0 are vulnerable to a path traversal flaw in the Knowledge Bases API. Unvalidated user supplied names become part of file system paths, allowing an authenticated attacker to delete any directory on the server. The flaw leads to loss of data and potential service disruption. The weakness is a classic directory traversal exploit (CWE-22).
Affected Systems
All installations of the Langflow AI platform with version numbers lower than 1.9.0 are affected. The vendor addressed the issue in release 1.9.0, which includes input sanitization for the DELETE /api/v1/knowledge_bases endpoint.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.6 and is classified as a critical weakness, but its EPSS score is currently unavailable and it is not listed in the CISA KEV catalog. Attackers require valid authentication to the API; once authenticated, they can execute the path traversal to delete arbitrary directories without further privileges. Given the high severity score and the potential to cripple services, the risk of exploitation is significant for exposed installations.
OpenCVE Enrichment
Github GHSA