Impact
A flaw in the langflow API Endpoint allows an attacker to upload any file through the create_upload_file function without restriction. The upload endpoint lacks proper authorization and file type validation, permitting the submission of malicious code that could be executed on the server. The vulnerability is directly exploitable over the network and carries the risk of arbitrary code execution, data exfiltration, or denial of service.
Affected Systems
The vulnerability affects the langflow-ai langflow application up to version 1.1.0 and potentially earlier releases that have not applied any subsequent patch. Operators should verify their installed version against this range and consider the application as vulnerable if it has not been updated beyond 1.1.0.
Risk and Exploitability
The reported CVSS score of 6.9 indicates a moderate severity, but the lack of authentication requirements and publicly available exploit code mean that the risk is higher than the score alone suggests. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog; however, the presence of a remote upload vector and the potential for arbitrary code execution imply that attackers could target this flaw without needing additional conditions. The attack is likely carried out via an HTTP POST request to the create_upload_file endpoint from any network location that can reach the server.
OpenCVE Enrichment