Impact
The vulnerability lies in an API endpoint that serves SVG files without sanitization. Malicious SVGs can embed JavaScript that executes when opened by other users, allowing an attacker to run code in the victim’s browser and exfiltrate cookies such as JWT tokens. This leads to unauthorized access and session hijacking.
Affected Systems
The flaw affects the Langflow AI platform (langflow). The CVE does not specify any particular version, so all deployments may be susceptible unless a future patch is applied.
Risk and Exploitability
A CVSS score of 7 indicates high severity. Although EPSS data is missing and the vulnerability is not listed in CISA’s KEV catalog, the stored nature and ability to inject JavaScript make exploitation likely against users who view uploaded content. The attack would require an attacker to upload a malicious SVG via the public endpoint, after which any user who views the file triggers the payload. The absence of an official fix means current risk remains high until a remediation is deployed.
OpenCVE Enrichment