Langflow versions prior to 1.0.13 suffer from a Privilege Escalation vulnerability, allowing a remote and low privileged attacker to gain super admin privileges by performing a mass assignment request on the '/api/v1/users' endpoint.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2024-26 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2024-26 | Exploit Third Party Advisory |
Configurations
History
24 Jun 2025, 16:38
Type | Values Removed | Values Added |
---|---|---|
First Time |
Langflow langflow
Langflow |
|
CPE | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* | |
References | () https://www.tenable.com/security/research/tra-2024-26 - Exploit, Third Party Advisory |
Information
Published : 2024-07-30 17:15
Updated : 2025-06-24 16:38
NVD link : CVE-2024-7297
Mitre link : CVE-2024-7297
CVE.ORG link : CVE-2024-7297
JSON object : View
Products Affected
langflow
- langflow
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources