Ad

CVE-2026-33309

CRITICAL CVSS 3.1: 9.9
Updated Mar 24, 2026
Langflow
Parameter Value
CVSS 9.9 (CRITICAL)
Affected Versions 1.2.0 — 1.9.0
Fixed In 1.9.0
Type CWE-284 (Improper Access Control), CWE-73 (External Control of File Name or Path), CWE-94 (Code Injection), CWE-22 (Path Traversal)
Vendor Langflow
Public PoC No

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to the root architectural issue within `LocalStorageService` remaining unresolved. Because the underlying storage layer lacks boundary containment checks, the system relies entirely on the HTTP-layer `ValidatedFileName` dependency.

This defense-in-depth failure leaves the `POST /api/v2/files/` endpoint vulnerable to Arbitrary File Write. The multipart upload filename bypasses the path-parameter guard, allowing authenticated attackers to write files anywhere on the host system, leading to Remote Code Execution (RCE). Version 1.9.0 contains an updated fix.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Langflow Langflow
cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
1.2.0 1.9.0