CVE-2026-33053: CWE-639: Authorization Bypass Through User-Controlled Key in langflow-ai langflow
CVE-2026-33053 is an authorization bypass vulnerability in langflow versions prior to 1. 9. 0. The issue arises because the delete_api_key_route() endpoint allows deletion of API keys based on a user-controlled api_key_id parameter without verifying ownership. Although the endpoint requires authentication, it does not confirm that the API key being deleted belongs to the authenticated user, enabling potential unauthorized deletion of other users' API keys. This flaw stems from CWE-639: Authorization Bypass Through User-Controlled Key. The vulnerability has a CVSS 4. 0 score of 6. 1 (medium severity), indicating moderate impact with network exploitability and low attack complexity. No known public exploits exist yet.
AI Analysis
Technical Summary
Langflow is a platform designed to build and deploy AI-powered agents and workflows, widely used in AI development environments. In versions before 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id parameter to specify which API key to delete. While this endpoint requires the user to be authenticated (via get_current_active_user dependency), it lacks a critical authorization check to verify that the API key targeted for deletion actually belongs to the authenticated user. The underlying CRUD function, delete_api_key(), does not enforce ownership validation, allowing an authenticated user to delete API keys belonging to other users by supplying arbitrary api_key_id values. This vulnerability is classified under CWE-639, which involves authorization bypass through user-controlled keys or identifiers. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N), with low complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality and availability is high (VI:H, VA:H), as unauthorized deletion of API keys can disrupt legitimate access and potentially enable further unauthorized actions if keys are reused or shared. No patches are linked yet, and no exploits are known in the wild, but the vulnerability poses a significant risk to environments relying on langflow for AI workflow management.
Potential Impact
The vulnerability allows authenticated users to delete API keys belonging to other users without proper authorization checks. This can lead to denial of service for legitimate users who lose access to their API keys, disrupting AI workflows and automation dependent on those keys. Additionally, malicious actors could target high-value API keys to cause operational outages or attempt to manipulate access controls indirectly. In multi-tenant or collaborative environments, this flaw could facilitate privilege escalation or lateral movement by removing keys that enforce access boundaries. Organizations relying on langflow for critical AI operations may face service interruptions, increased operational overhead to recover lost keys, and potential exposure to further attacks if API key management is compromised. The medium CVSS score reflects moderate ease of exploitation and significant impact on availability and integrity, though confidentiality impact is limited to indirect effects.
Mitigation Recommendations
Organizations should upgrade langflow to version 1.9.0 or later where this vulnerability is fixed by enforcing ownership verification before API key deletion. Until an upgrade is possible, implement compensating controls such as restricting access to the delete_api_key_route() endpoint to highly trusted users only, monitoring API key deletion logs for suspicious activity, and enforcing strict API key management policies. Additionally, consider implementing network-level access controls and multi-factor authentication to reduce the risk of unauthorized authenticated access. Developers should review and enhance authorization logic in all CRUD operations involving sensitive resources to ensure ownership validation. Regular security audits and penetration testing focused on authorization checks can help detect similar flaws. Finally, maintain an inventory of API keys and their owners to quickly identify and recover from unauthorized deletions.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Japan, South Korea, Australia, India, Netherlands
CVE-2026-33053: CWE-639: Authorization Bypass Through User-Controlled Key in langflow-ai langflow
Description
CVE-2026-33053 is an authorization bypass vulnerability in langflow versions prior to 1. 9. 0. The issue arises because the delete_api_key_route() endpoint allows deletion of API keys based on a user-controlled api_key_id parameter without verifying ownership. Although the endpoint requires authentication, it does not confirm that the API key being deleted belongs to the authenticated user, enabling potential unauthorized deletion of other users' API keys. This flaw stems from CWE-639: Authorization Bypass Through User-Controlled Key. The vulnerability has a CVSS 4. 0 score of 6. 1 (medium severity), indicating moderate impact with network exploitability and low attack complexity. No known public exploits exist yet.
AI-Powered Analysis
Technical Analysis
Langflow is a platform designed to build and deploy AI-powered agents and workflows, widely used in AI development environments. In versions before 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id parameter to specify which API key to delete. While this endpoint requires the user to be authenticated (via get_current_active_user dependency), it lacks a critical authorization check to verify that the API key targeted for deletion actually belongs to the authenticated user. The underlying CRUD function, delete_api_key(), does not enforce ownership validation, allowing an authenticated user to delete API keys belonging to other users by supplying arbitrary api_key_id values. This vulnerability is classified under CWE-639, which involves authorization bypass through user-controlled keys or identifiers. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N), with low complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality and availability is high (VI:H, VA:H), as unauthorized deletion of API keys can disrupt legitimate access and potentially enable further unauthorized actions if keys are reused or shared. No patches are linked yet, and no exploits are known in the wild, but the vulnerability poses a significant risk to environments relying on langflow for AI workflow management.
Potential Impact
The vulnerability allows authenticated users to delete API keys belonging to other users without proper authorization checks. This can lead to denial of service for legitimate users who lose access to their API keys, disrupting AI workflows and automation dependent on those keys. Additionally, malicious actors could target high-value API keys to cause operational outages or attempt to manipulate access controls indirectly. In multi-tenant or collaborative environments, this flaw could facilitate privilege escalation or lateral movement by removing keys that enforce access boundaries. Organizations relying on langflow for critical AI operations may face service interruptions, increased operational overhead to recover lost keys, and potential exposure to further attacks if API key management is compromised. The medium CVSS score reflects moderate ease of exploitation and significant impact on availability and integrity, though confidentiality impact is limited to indirect effects.
Mitigation Recommendations
Organizations should upgrade langflow to version 1.9.0 or later where this vulnerability is fixed by enforcing ownership verification before API key deletion. Until an upgrade is possible, implement compensating controls such as restricting access to the delete_api_key_route() endpoint to highly trusted users only, monitoring API key deletion logs for suspicious activity, and enforcing strict API key management policies. Additionally, consider implementing network-level access controls and multi-factor authentication to reduce the risk of unauthorized authenticated access. Developers should review and enhance authorization logic in all CRUD operations involving sensitive resources to ensure ownership validation. Regular security audits and penetration testing focused on authorization checks can help detect similar flaws. Finally, maintain an inventory of API keys and their owners to quickly identify and recover from unauthorized deletions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T18:10:50.212Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bcf624e32a4fbe5f3a7104
Added to database: 3/20/2026, 7:24:20 AM
Last enriched: 3/20/2026, 7:39:51 AM
Last updated: 3/20/2026, 8:30:56 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.