CVE-2026-33053: CWE-639: Authorization Bypass Through User-Controlled Key in langflow-ai langflow
CVE-2026-33053 is an authorization bypass vulnerability in langflow versions prior to 1. 9. 0. The issue occurs because the delete_api_key_route() endpoint allows deletion of API keys based solely on a generic authentication check without verifying ownership of the API key. This flaw enables an authenticated user with limited privileges to delete API keys belonging to other users. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and has a CVSS 4. 0 score of 6. 1 (medium severity). Exploitation requires authentication but no user interaction, and it can lead to denial of service for affected users by removing their API keys. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
Langflow is a platform for building and deploying AI-powered agents and workflows. In versions before 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id as a path parameter to delete API keys. While the endpoint enforces a generic authentication check via the get_current_active_user dependency, it does not verify that the API key being deleted actually belongs to the authenticated user. The underlying delete_api_key() CRUD function lacks ownership validation, allowing any authenticated user to delete arbitrary API keys by specifying their IDs. This is a classic authorization bypass vulnerability categorized as CWE-639. The vulnerability could be exploited remotely over the network without user interaction, requiring only low privileges (authenticated user). The impact includes unauthorized deletion of API keys, potentially disrupting legitimate users’ access to the system and causing denial of service. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity and availability. No patches are linked yet, but upgrading to version 1.9.0 or later is expected to resolve the issue by enforcing proper ownership checks.
Potential Impact
This vulnerability can significantly impact organizations relying on langflow for AI workflow automation. Unauthorized deletion of API keys can disrupt legitimate users’ ability to access or manage AI agents, leading to operational downtime and loss of productivity. Attackers could target high-value users or administrators to cause denial of service or interfere with AI workflows. Since API keys often grant programmatic access, their deletion could also complicate incident response and recovery. While the vulnerability does not directly expose sensitive data, the loss of API keys affects system integrity and availability. Organizations with multiple users and shared environments are at higher risk. The medium severity rating reflects the moderate ease of exploitation combined with impactful consequences on availability and integrity.
Mitigation Recommendations
Organizations should upgrade langflow to version 1.9.0 or later where the vulnerability is fixed by enforcing API key ownership verification before deletion. Until upgrading, restrict access to the delete_api_key_route() endpoint to trusted users only and monitor API key deletion logs for suspicious activity. Implement additional access controls or API gateway policies to validate API key ownership at the application or network layer. Conduct regular audits of API keys and their usage to detect unauthorized deletions. Educate users about the importance of safeguarding API key identifiers to prevent misuse. Consider implementing multi-factor authentication and role-based access controls to reduce the risk of unauthorized authenticated access. Finally, maintain an incident response plan to quickly restore deleted API keys and minimize disruption.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Australia, Japan, South Korea, India, Netherlands
CVE-2026-33053: CWE-639: Authorization Bypass Through User-Controlled Key in langflow-ai langflow
Description
CVE-2026-33053 is an authorization bypass vulnerability in langflow versions prior to 1. 9. 0. The issue occurs because the delete_api_key_route() endpoint allows deletion of API keys based solely on a generic authentication check without verifying ownership of the API key. This flaw enables an authenticated user with limited privileges to delete API keys belonging to other users. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and has a CVSS 4. 0 score of 6. 1 (medium severity). Exploitation requires authentication but no user interaction, and it can lead to denial of service for affected users by removing their API keys. No known exploits are currently reported in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Langflow is a platform for building and deploying AI-powered agents and workflows. In versions before 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id as a path parameter to delete API keys. While the endpoint enforces a generic authentication check via the get_current_active_user dependency, it does not verify that the API key being deleted actually belongs to the authenticated user. The underlying delete_api_key() CRUD function lacks ownership validation, allowing any authenticated user to delete arbitrary API keys by specifying their IDs. This is a classic authorization bypass vulnerability categorized as CWE-639. The vulnerability could be exploited remotely over the network without user interaction, requiring only low privileges (authenticated user). The impact includes unauthorized deletion of API keys, potentially disrupting legitimate users’ access to the system and causing denial of service. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on integrity and availability. No patches are linked yet, but upgrading to version 1.9.0 or later is expected to resolve the issue by enforcing proper ownership checks.
Potential Impact
This vulnerability can significantly impact organizations relying on langflow for AI workflow automation. Unauthorized deletion of API keys can disrupt legitimate users’ ability to access or manage AI agents, leading to operational downtime and loss of productivity. Attackers could target high-value users or administrators to cause denial of service or interfere with AI workflows. Since API keys often grant programmatic access, their deletion could also complicate incident response and recovery. While the vulnerability does not directly expose sensitive data, the loss of API keys affects system integrity and availability. Organizations with multiple users and shared environments are at higher risk. The medium severity rating reflects the moderate ease of exploitation combined with impactful consequences on availability and integrity.
Mitigation Recommendations
Organizations should upgrade langflow to version 1.9.0 or later where the vulnerability is fixed by enforcing API key ownership verification before deletion. Until upgrading, restrict access to the delete_api_key_route() endpoint to trusted users only and monitor API key deletion logs for suspicious activity. Implement additional access controls or API gateway policies to validate API key ownership at the application or network layer. Conduct regular audits of API keys and their usage to detect unauthorized deletions. Educate users about the importance of safeguarding API key identifiers to prevent misuse. Consider implementing multi-factor authentication and role-based access controls to reduce the risk of unauthorized authenticated access. Finally, maintain an incident response plan to quickly restore deleted API keys and minimize disruption.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T18:10:50.212Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bcf624e32a4fbe5f3a7104
Added to database: 3/20/2026, 7:24:20 AM
Last enriched: 3/27/2026, 7:41:10 PM
Last updated: 5/3/2026, 3:16:44 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.