CVE-2026-33484: CWE-284: Improper Access Control in langflow-ai langflow
CVE-2026-33484 is a high-severity improper access control vulnerability in langflow versions 1. 0. 0 through 1. 8. 1. The vulnerability exists in the /api/v1/files/images/{flow_id}/{file_name} endpoint, which serves image files without any authentication or ownership verification. An attacker who can guess or discover a valid flow_id can download any user's images without credentials, leading to unauthorized data disclosure. This issue affects multi-tenant deployments where UUIDs for flow_id can be leaked through other API responses. The vulnerability has a CVSS score of 7. 5, indicating a high impact on confidentiality but no impact on integrity or availability.
AI Analysis
Technical Summary
Langflow is a platform for building and deploying AI-powered agents and workflows. Versions 1.0.0 through 1.8.1 contain a critical security flaw in the image-serving API endpoint /api/v1/files/images/{flow_id}/{file_name}. This endpoint does not enforce any authentication or authorization checks before serving image files. Because flow_id values are UUIDs that can be leaked or inferred from other API responses, an attacker can enumerate or guess these identifiers to access images uploaded by other users. This represents an improper access control vulnerability (CWE-284) combined with information exposure (CWE-639) and missing authorization checks (CWE-862). The vulnerability allows unauthenticated remote attackers to retrieve sensitive image files, violating confidentiality. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) reflects that exploitation requires no privileges or user interaction, is remotely exploitable over the network, and results in high confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild. The issue is resolved in langflow version 1.9.0 by adding proper authentication and ownership verification to the endpoint.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive image files uploaded by users in multi-tenant langflow deployments. Attackers can access private images without authentication, potentially exposing confidential or proprietary information embedded in these images. This breach of confidentiality can lead to privacy violations, intellectual property theft, or leakage of sensitive business data. Since the vulnerability does not affect integrity or availability, the threat is limited to data exposure. However, the ease of exploitation (no authentication or user interaction required) and the widespread use of langflow in AI workflow deployments increase the risk. Organizations using affected versions may face reputational damage, compliance violations, and potential financial losses if sensitive data is exposed. Multi-tenant cloud environments and managed service providers running langflow are particularly at risk due to shared infrastructure and multiple users.
Mitigation Recommendations
1. Upgrade langflow to version 1.9.0 or later immediately, as this version contains the patch that enforces authentication and ownership checks on the vulnerable endpoint. 2. If upgrading is not immediately possible, implement network-level access controls to restrict access to the /api/v1/files/images/ endpoint only to trusted users or internal networks. 3. Monitor API logs for unusual access patterns or repeated requests to image endpoints with varying flow_id values, which may indicate enumeration attempts. 4. Review and audit other API endpoints for similar improper access control issues to prevent further data leakage. 5. Educate developers and administrators about secure API design principles, emphasizing the need for strict authentication and authorization on all resource-serving endpoints. 6. Consider implementing rate limiting and anomaly detection on API endpoints to reduce the risk of automated attacks. 7. Conduct regular security assessments and penetration testing focused on multi-tenant access controls in langflow deployments.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-33484: CWE-284: Improper Access Control in langflow-ai langflow
Description
CVE-2026-33484 is a high-severity improper access control vulnerability in langflow versions 1. 0. 0 through 1. 8. 1. The vulnerability exists in the /api/v1/files/images/{flow_id}/{file_name} endpoint, which serves image files without any authentication or ownership verification. An attacker who can guess or discover a valid flow_id can download any user's images without credentials, leading to unauthorized data disclosure. This issue affects multi-tenant deployments where UUIDs for flow_id can be leaked through other API responses. The vulnerability has a CVSS score of 7. 5, indicating a high impact on confidentiality but no impact on integrity or availability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Langflow is a platform for building and deploying AI-powered agents and workflows. Versions 1.0.0 through 1.8.1 contain a critical security flaw in the image-serving API endpoint /api/v1/files/images/{flow_id}/{file_name}. This endpoint does not enforce any authentication or authorization checks before serving image files. Because flow_id values are UUIDs that can be leaked or inferred from other API responses, an attacker can enumerate or guess these identifiers to access images uploaded by other users. This represents an improper access control vulnerability (CWE-284) combined with information exposure (CWE-639) and missing authorization checks (CWE-862). The vulnerability allows unauthenticated remote attackers to retrieve sensitive image files, violating confidentiality. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) reflects that exploitation requires no privileges or user interaction, is remotely exploitable over the network, and results in high confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild. The issue is resolved in langflow version 1.9.0 by adding proper authentication and ownership verification to the endpoint.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive image files uploaded by users in multi-tenant langflow deployments. Attackers can access private images without authentication, potentially exposing confidential or proprietary information embedded in these images. This breach of confidentiality can lead to privacy violations, intellectual property theft, or leakage of sensitive business data. Since the vulnerability does not affect integrity or availability, the threat is limited to data exposure. However, the ease of exploitation (no authentication or user interaction required) and the widespread use of langflow in AI workflow deployments increase the risk. Organizations using affected versions may face reputational damage, compliance violations, and potential financial losses if sensitive data is exposed. Multi-tenant cloud environments and managed service providers running langflow are particularly at risk due to shared infrastructure and multiple users.
Mitigation Recommendations
1. Upgrade langflow to version 1.9.0 or later immediately, as this version contains the patch that enforces authentication and ownership checks on the vulnerable endpoint. 2. If upgrading is not immediately possible, implement network-level access controls to restrict access to the /api/v1/files/images/ endpoint only to trusted users or internal networks. 3. Monitor API logs for unusual access patterns or repeated requests to image endpoints with varying flow_id values, which may indicate enumeration attempts. 4. Review and audit other API endpoints for similar improper access control issues to prevent further data leakage. 5. Educate developers and administrators about secure API design principles, emphasizing the need for strict authentication and authorization on all resource-serving endpoints. 6. Consider implementing rate limiting and anomaly detection on API endpoints to reduce the risk of automated attacks. 7. Conduct regular security assessments and penetration testing focused on multi-tenant access controls in langflow deployments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:16:48.970Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c29cc3f4197a8e3b3c19e9
Added to database: 3/24/2026, 2:16:35 PM
Last enriched: 3/24/2026, 2:31:20 PM
Last updated: 3/24/2026, 3:26:04 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.