CVE-2024-7297

Langflow versions prior to 1.0.13 suffer from a Privilege Escalation vulnerability, allowing a remote and low privileged attacker to gain super admin privileges by performing a mass assignment request on the '/api/v1/users' endpoint.
References
Link Resource
https://www.tenable.com/security/research/tra-2024-26 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2024-26 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

History

24 Jun 2025, 16:38

Type Values Removed Values Added
First Time Langflow langflow
Langflow
References () https://www.tenable.com/security/research/tra-2024-26 - () https://www.tenable.com/security/research/tra-2024-26 - Exploit, Third Party Advisory
CPE cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

21 Nov 2024, 09:51

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2024-26 - () https://www.tenable.com/security/research/tra-2024-26 -

31 Jul 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Las versiones de Langflow anteriores a la 1.0.13 sufren de una vulnerabilidad de escalada de privilegios, lo que permite a un atacante remoto y con pocos privilegios obtener privilegios de superadministrador al realizar una solicitud de asignación masiva en el endpoint '/api/v1/users'.

30 Jul 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-30 17:15

Updated : 2025-06-24 16:38


NVD link : CVE-2024-7297

Mitre link : CVE-2024-7297

CVE.ORG link : CVE-2024-7297


JSON object : View

Products Affected

langflow

  • langflow
CWE
CWE-913

Improper Control of Dynamically-Managed Code Resources