TROYANOSYVIRUS
Back to CVEs

CVE-2026-33309

CRITICAL
9.9

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to the root architectural issue within `LocalStorageService` remaining unresolved. Because the underlying storage layer lacks boundary containment checks, the system relies entirely on the HTTP-layer `ValidatedFileName` dependency. This defense-in-depth failure leaves the `POST /api/v2/files/` endpoint vulnerable to Arbitrary File Write. The multipart upload filename bypasses the path-parameter guard, allowing authenticated attackers to write files anywhere on the host system, leading to Remote Code Execution (RCE). Version 1.9.0 contains an updated fix.

CVE Details

CVSS v3.1 Score9.9
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/24/2026
Last Modified3/24/2026
Sourcenvd
Honeypot Sightings0

Affected Products

langflow:langflow

Weaknesses (CWE)

CWE-22CWE-73CWE-94CWE-284

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.