Platform
python
Component
langflow
Fixed in
0.0.1
CVE-2026-5027 is a path traversal vulnerability affecting Langflow. The vulnerability allows an attacker to write files to arbitrary locations on the filesystem. This issue affects Langflow versions 0-0. There is currently no official patch available to address this vulnerability.
CVE-2026-5027 impacts Langflow, allowing an attacker to write files to arbitrary locations on the filesystem. The vulnerability resides in the '/api/v2/files' endpoint, specifically the lack of sanitization of the 'filename' parameter received via multipart form data. An attacker can exploit this by using path traversal sequences ('../') in the filename to overwrite critical files or upload malicious files. The CVSS severity is 8.8 (High), indicating a significant risk. The absence of a fix available further exacerbates the situation, requiring immediate attention. The lack of a KEV (Kernel Exploit Vulnerability) indicates that no publicly known exploitation has been documented, but the vulnerability remains exploitable.
An attacker could exploit this vulnerability by sending a POST request to the '/api/v2/files' endpoint with a 'filename' containing path traversal sequences. For example, a filename like '.../etc/passwd' could overwrite the system's password file. The success of exploitation depends on the permissions of the user executing the Langflow process. If the process runs with elevated privileges, the impact could be devastating. Lack of authentication on the endpoint (if it exists) would further facilitate exploitation.
Exploit Status
EPSS
0.06% (19% percentile)
CISA SSVC
CVSS Vector
Given that no official fix is available, immediate mitigation focuses on avoiding exposure of the '/api/v2/files' endpoint. This can be achieved by disabling the endpoint, restricting access to authenticated and authorized users, or implementing robust filename validation in the Langflow code. Validation should include stripping path traversal sequences ('../') and verifying that the filename conforms to an expected pattern. Monitoring system logs for suspicious access or file writing attempts is also crucial. Users of Langflow are strongly advised to stay informed about any updates or patches that may be released by the developers.
Actualice Langflow a una versión posterior a la 0. Esto solucionará la vulnerabilidad de path traversal. Asegúrese de que la nueva versión implemente una sanitización adecuada del parámetro 'filename' al procesar archivos.
Vulnerability analysis and critical alerts directly to your inbox.
Path traversal is an attack technique that allows an attacker to access files and directories outside the intended web directory.
If you are using a version of Langflow that hasn't been patched, you are likely vulnerable. Review Langflow documentation for affected versions.
Immediately isolate the affected system from the network and perform a thorough security audit. Consider restoring from a clean backup.
Vulnerability scanners can detect this vulnerability. You can also perform manual testing using tools like Burp Suite.
No fix is currently available. Monitor official Langflow channels for updates.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.