CVE-2025-34291
Langflow <= 1.6.9 CORS Misconfiguration to Token Hijack & RCE
Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints โ including built-in code-execution functionality โ allowing the attacker to execute arbitrary code and achieve full system compromise.
| CWE | CWE-346 |
| Vendor | langflow |
| Product | langflow |
| Published | Dec 5, 2025 |
| Last Updated | Mar 5, 2026 |
Get instant alerts for langflow langflow
Be the first to know when new unknown vulnerabilities affecting langflow langflow are published โ delivered to Slack, Telegram or Discord.