Impact
A flaw in langflow‑ai's Langflow up to version 1.8.3 allows a malicious user to inject arbitrary scripts into the edit‑message component when the unknown function is executed. The attack requires the ability to manipulate data that is rendered by the frontend, and can be launched remotely. The resulting cross‑site scripting can lead to execution of attacker code in users’ browsers, enabling cookie theft, session hijacking, and defacement. The weakness is identified as CWE‑79.
Affected Systems
langflow‑ai’s Langflow, versions up to 1.8.3, specifically the file src/frontend/src/modals/IOModal/components/chatView/chatMessage/components/edit‑message.tsx in the frontend React component rendering.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity, and no EPSS data is available. The vulnerability is not listed in the CISA KEV catalog. Attackers can remotely exploit the flaw by manipulating data sent to the edit‑message component. Published exploits indicate that the flaw can be used to inject and execute arbitrary scripts in the victim’s browser context.
OpenCVE Enrichment