๐Ÿ” CVE Alert

CVE-2026-34046

UNKNOWN 0.0

Langflow: Authenticated Users Can Read, Modify, and Delete Any Flow via Missing Ownership Check

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
24th

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.5.1, the `_read_flow` helper in `src/backend/base/langflow/api/v1/flows.py` branched on the `AUTO_LOGIN` setting to decide whether to filter by `user_id`. When `AUTO_LOGIN` was `False` (i.e., authentication was enabled), neither branch enforced an ownership check โ€” the query returned any flow matching the given UUID regardless of who owned it. This allowed any authenticated user to read any other user's flow, including embedded plaintext API keys; modify the logic of another user's AI agents, and/or delete flows belonging to other users. The vulnerability was introduced by the conditional logic that was meant to accommodate public/example flows (those with `user_id = NULL`) under auto-login mode, but inadvertently left the authenticated path without an ownership filter. The fix in version 1.5.1 removes the `AUTO_LOGIN` conditional entirely and unconditionally scopes the query to the requesting user.

CWE CWE-639 CWE-862
Vendor langflow-ai
Product langflow
Published Mar 27, 2026
Last Updated Apr 1, 2026
Stay Ahead of the Next One

Get instant alerts for langflow-ai langflow

Be the first to know when new unknown vulnerabilities affecting langflow-ai langflow are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

langflow-ai / langflow
< 1.5.1
langflow-ai / langflow-base
< 0.5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/langflow-ai/langflow/security/advisories/GHSA-8c4j-f57c-35cf github.com: https://github.com/langflow-ai/langflow/pull/8956