Changeflow GovPing Data Privacy & Cybersecurity Langflow Vulnerability Allows File Manipulation
Priority review Notice Amended Final

Langflow Vulnerability Allows File Manipulation

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 25th, 2026
Detected March 26th, 2026
Email

Summary

CERT-Bund has issued a security advisory for Langflow versions prior to 1.5.1 and Langflow Base prior to 0.5.1, detailing a vulnerability that allows remote, authenticated attackers to manipulate files. The advisory highlights a CVSS base score of 8.8, indicating a high severity.

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0868) concerning a critical vulnerability in Langflow and Langflow Base. The vulnerability, rated with a CVSS base score of 8.8, allows authenticated remote attackers to manipulate files on affected systems, which include Linux, UNIX, and Windows operating systems.

Organizations utilizing affected versions of Langflow (<1.5.1) or Langflow Base (<0.5.1) should immediately apply available mitigations or update to a patched version. Failure to address this vulnerability could lead to unauthorized data modification or system compromise. The advisory indicates that mitigations are available, and users are strongly encouraged to implement them promptly.

What to do next

  1. Update Langflow to version 1.5.1 or later
  2. Update Langflow Base to version 0.5.1 or later
  3. Implement available mitigations if immediate update is not possible

Source document (simplified)

[WID-SEC-2026-0868] Langflow: Schwachstelle ermöglicht Manipulation von Dateien CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 25.03.2026 Stand 26.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Langflow bietet eine visuelle Schnittstelle zum Erstellen von LLM-basierten Anwendungen.

Produkte

25.03.2026
- Open Source Langflow <1.5.1

  • Open Source Langflow Base <0.5.1

Angriff

Angriff

Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Langflow ausnutzen, um Dateien zu manipulieren. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 25th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0868

Who this affects

Applies to
Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Software Development Application Security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software Vulnerabilities Data Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.