Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7297: CWE-913 Improper Control of Dynamically-Managed Code Resources

0
High
VulnerabilityCVE-2024-7297cvecve-2024-7297cwe-913
Published: Tue Jul 30 2024 (07/30/2024, 16:13:48 UTC)
Source: CVE Database V5

Description

Langflow versions prior to 1.0.13 suffer from a Privilege Escalation vulnerability, allowing a remote and low privileged attacker to gain super admin privileges by performing a mass assignment request on the '/api/v1/users' endpoint.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 16:29:53 UTC

Technical Analysis

CVE-2024-7297 is a privilege escalation vulnerability identified in Langflow versions prior to 1.0.13, classified under CWE-913, which involves improper control of dynamically-managed code resources. The flaw exists due to a mass assignment vulnerability on the '/api/v1/users' REST API endpoint, where an attacker with low privileges can manipulate user attributes en masse, thereby escalating their privileges to super admin level. This vulnerability is remotely exploitable over the network without requiring user interaction and has a low attack complexity, as indicated by its CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact is severe, affecting confidentiality, integrity, and availability, as an attacker gaining super admin privileges can fully control the application, access sensitive data, modify or delete resources, and disrupt services. Although no exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a critical concern for organizations relying on Langflow. The absence of patch links suggests that immediate mitigation steps are necessary until an official fix is released. The vulnerability highlights the risks associated with improper input validation and insufficient access control in API endpoints managing user data.

Potential Impact

The vulnerability allows an attacker with low privileges to gain super admin rights, leading to full system compromise. This can result in unauthorized access to sensitive data, modification or deletion of critical resources, and disruption of services, severely impacting organizational operations. The breach of confidentiality, integrity, and availability can lead to data leaks, loss of trust, regulatory penalties, and significant financial damage. Organizations using Langflow in production environments, especially those managing sensitive or critical workflows, face heightened risk. The ease of remote exploitation without user interaction increases the likelihood of automated attacks. Additionally, the lack of known exploits currently in the wild provides a narrow window for proactive defense before potential widespread exploitation occurs.

Mitigation Recommendations

1. Upgrade Langflow to version 1.0.13 or later immediately once available to apply the official patch addressing this vulnerability. 2. Until a patch is released, implement strict input validation and sanitization on the '/api/v1/users' endpoint to prevent mass assignment of privileged attributes. 3. Employ API gateway or web application firewall (WAF) rules to detect and block suspicious mass assignment patterns or unauthorized privilege escalation attempts. 4. Restrict access to the '/api/v1/users' endpoint to trusted IP addresses or authenticated roles with necessary privileges only. 5. Conduct thorough audits of user roles and permissions to ensure no excessive privileges are granted inadvertently. 6. Monitor logs for unusual activity related to user management endpoints to detect potential exploitation attempts early. 7. Educate development teams on secure coding practices to avoid mass assignment vulnerabilities in future API designs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2024-07-30T15:07:37.840Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6acf53c064ed76fc0f152

Added to database: 3/27/2026, 4:14:45 PM

Last enriched: 3/27/2026, 4:29:53 PM

Last updated: 3/27/2026, 11:41:12 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses