๐Ÿ” CVE Alert

CVE-2026-6599

MEDIUM 6.3

langflow-ai langflow Model Context Protocol Configuration API mcp_projects.py install_mcp_config injection

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was detected in langflow-ai langflow up to 1.8.3. The impacted element is the function get_client_ip/install_mcp_config of the file src/backend/base/langflow/api/v1/mcp_projects.py of the component Model Context Protocol Configuration API. Performing a manipulation of the argument X-Forwarded-For results in injection. The attack may be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-74 CWE-707
Vendor langflow-ai
Product langflow
Published Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for langflow-ai langflow

Be the first to know when new medium vulnerabilities affecting langflow-ai langflow are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

langflow-ai / langflow
1.8.0 1.8.1 1.8.2 1.8.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/358234 vuldb.com: https://vuldb.com/vuln/358234/cti vuldb.com: https://vuldb.com/submit/791922 gist.github.com: https://gist.github.com/chenhouser2025/a909c47316b7a0948ee68c109ab747a3

Credits

๐Ÿ” Eric-f (VulDB User) VulDB CNA Team