PyPi: Langflow

CVE-2024-37014

Safety vulnerability ID: 71781

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jun 10, 2024 Updated at Jan 29, 2025
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of Langflow allow remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.

Affected package

langflow

Latest version: 1.1.3

A Python package with a built-in web application

Affected versions

Fixed versions

Vulnerability changelog

Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script. See CVE-2024-37014.


MISC:https://github.com/langflow-ai/langflow/issues/1973: https://github.com/langflow-ai/langflow/issues/1973

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.8

CVSS v3 Details

CRITICAL 9.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH