Impact
The vulnerability involves the Flow Using API component in langflow up to version 1.8.3, where the remove_api_keys/has_api_terms function stores credentials without protection. This flaw allows an attacker to store or retrieve API credentials in plain text, leading to credential disclosure. The vulnerability can be triggered remotely, and a public exploit exists, indicating that attackers can exploit it over the network.
Affected Systems
Affected vendors and products include langflow-ai's Langflow application. Versions up to 1.8.3 are impacted. No newer versions are listed in the data; administrators should verify whether a fix has been released beyond 1.8.3.
Risk and Exploitability
The CVSS score is 5.1, placing the vulnerability in the medium severity range. EPSS is not available, and the issue is not listed in CISA's KEV catalog. However, the public availability of an exploit and the ability to trigger the flaw remotely constitute a non-negligible risk. The weakness is categorized as CWE-255 and CWE-256, both involving inadequate credential storage and protection.
OpenCVE Enrichment