Langflow versions prior to 1.0.13 suffer from a Privilege Escalation vulnerability, allowing a remote and low privileged attacker to gain super admin privileges by performing a mass assignment request on the '/api/v1/users' endpoint.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2024-26 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2024-26 | Exploit Third Party Advisory |
Configurations
History
24 Jun 2025, 16:38
Type | Values Removed | Values Added |
---|---|---|
First Time |
Langflow langflow
Langflow |
|
References | () https://www.tenable.com/security/research/tra-2024-26 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2024-26 - |
31 Jul 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-30 17:15
Updated : 2025-06-24 16:38
NVD link : CVE-2024-7297
Mitre link : CVE-2024-7297
CVE.ORG link : CVE-2024-7297
JSON object : View
Products Affected
langflow
- langflow
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources