Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33053: CWE-639: Authorization Bypass Through User-Controlled Key in langflow-ai langflow

0
Medium
VulnerabilityCVE-2026-33053cvecve-2026-33053cwe-639
Published: Fri Mar 20 2026 (03/20/2026, 06:53:48 UTC)
Source: CVE Database V5
Vendor/Project: langflow-ai
Product: langflow

Description

CVE-2026-33053 is an authorization bypass vulnerability in langflow versions prior to 1. 9. 0. The issue occurs because the delete_api_key_route() endpoint allows deletion of API keys based solely on a generic authentication check without verifying ownership of the API key. This flaw enables an authenticated user with limited privileges to delete API keys belonging to other users. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and has a CVSS 4. 0 score of 6. 1 (medium severity). Exploitation requires authentication but no user interaction, and it can lead to denial of service for affected users by removing their API keys. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:41:10 UTC

Technical Analysis

Langflow is a platform for building and deploying AI-powered agents and workflows. In versions before 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id as a path parameter to delete API keys. While the endpoint enforces a generic authentication check via the get_current_active_user dependency, it does not verify that the API key being deleted actually belongs to the authenticated user. The underlying delete_api_key() CRUD function lacks ownership validation, allowing any authenticated user to delete arbitrary API keys by specifying their IDs. This is a classic authorization bypass vulnerability categorized as CWE-639. The vulnerability could be exploited remotely over the network without user interaction, requiring only low privileges (authenticated user). The impact includes unauthorized deletion of API keys, potentially disrupting legitimate users’ access to the system and causing denial of service. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity and availability. No patches are linked yet, but upgrading to version 1.9.0 or later is expected to resolve the issue by enforcing proper ownership checks.

Potential Impact

This vulnerability can significantly impact organizations relying on langflow for AI workflow automation. Unauthorized deletion of API keys can disrupt legitimate users’ ability to access or manage AI agents, leading to operational downtime and loss of productivity. Attackers could target high-value users or administrators to cause denial of service or interfere with AI workflows. Since API keys often grant programmatic access, their deletion could also complicate incident response and recovery. While the vulnerability does not directly expose sensitive data, the loss of API keys affects system integrity and availability. Organizations with multiple users and shared environments are at higher risk. The medium severity rating reflects the moderate ease of exploitation combined with impactful consequences on availability and integrity.

Mitigation Recommendations

Organizations should upgrade langflow to version 1.9.0 or later where the vulnerability is fixed by enforcing API key ownership verification before deletion. Until upgrading, restrict access to the delete_api_key_route() endpoint to trusted users only and monitor API key deletion logs for suspicious activity. Implement additional access controls or API gateway policies to validate API key ownership at the application or network layer. Conduct regular audits of API keys and their usage to detect unauthorized deletions. Educate users about the importance of safeguarding API key identifiers to prevent misuse. Consider implementing multi-factor authentication and role-based access controls to reduce the risk of unauthorized authenticated access. Finally, maintain an incident response plan to quickly restore deleted API keys and minimize disruption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.212Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcf624e32a4fbe5f3a7104

Added to database: 3/20/2026, 7:24:20 AM

Last enriched: 3/27/2026, 7:41:10 PM

Last updated: 5/3/2026, 3:16:44 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses