Description
IBM Langflow Desktop 1.2.0 through 1.8.4 Langflow could allow an authenticated attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to write arbitrary files on the system.
Published: 2026-04-30
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A path traversal flaw in IBM Langflow Desktop allows an authenticated attacker to send a specially crafted URL request containing "../" sequences to write arbitrary files on the system. This capability permits the creation of files in unintended locations, potentially including executable scripts or binaries, which can lead to remote code execution if the file is later executed by the service or an internal user. The weakness is a classic directory traversal (CWE‑22) and is categorized as a moderate to high severity vulnerability because it requires authentication but offers significant attack surface for compromising the host environment.

Affected Systems

IBM Langflow Desktop versions 1.2.0 through 1.8.4, inclusive. The affected product is the IBM Langflow Desktop application.

Risk and Exploitability

The CVSS score of 6.5 reflects a medium to high risk. No EPSS score is available, and the vulnerability is not listed in CISA’s KEV catalog, indicating limited public exploitation data. The attack requires valid credentials and an endpoint to which the attacker can send crafted requests, making it an authenticated, network‑based attack vector. Successful exploitation could compromise the integrity of the system by allowing arbitrary file creation and potentially lead to remote code execution if the attacker controls execution of the written files.

Generated by OpenCVE AI on May 2, 2026 at 00:15 UTC.

Remediation

Vendor Solution

IBM recommends addressing the vulnerability now by upgrading to IBM Langflow Desktop 1.9.0 or newer https://www.langflow.org/blog/langflow-1-9-desktopIf you are already using Langflow Desktop, upgrade in the application to version 1.9.0To install Langflow Desktop for the first time, visit  Langflow Desktop.Download


OpenCVE Recommended Actions

  • Upgrade IBM Langflow Desktop to version 1.9.0 or newer, following IBM’s recommended update path.
  • Ensure that the API is accessed only by authenticated users with the least privileges necessary, restricting who can send requests that would trigger file creation.
  • Configure a web application firewall or modify the application logic to reject URL paths containing "../" sequences, thereby blocking attempts to traverse directories.
  • Continuously monitor file system events and application logs for unexpected file write activity to detect and respond to potential exploitation attempts.

Generated by OpenCVE AI on May 2, 2026 at 00:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Description IBM Langflow Desktop 1.2.0 through 1.8.4 Langflow could allow an authenticated attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to write arbitrary files on the system.
Title Arbitrary File Write and Remote Code Execution Vulnerability in Langflow v2 API
First Time appeared Ibm
Ibm langflow Desktop
Weaknesses CWE-22
CPEs cpe:2.3:a:ibm:langflow_desktop:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:langflow_desktop:1.8.4:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm langflow Desktop
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Ibm Langflow Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-05-01T14:58:10.215Z

Reserved: 2026-03-20T13:47:59.369Z

Link: CVE-2026-4502

cve-icon Vulnrichment

Updated: 2026-05-01T14:57:31.370Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-30T21:16:33.533

Modified: 2026-05-01T15:27:15.287

Link: CVE-2026-4502

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:30:16Z

Weaknesses