Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5022: CWE-862 Missing Authorization in langflow-ai langflow

0
Medium
VulnerabilityCVE-2026-5022cvecve-2026-5022cwe-862
Published: Fri Mar 27 2026 (03/27/2026, 14:34:14 UTC)
Source: CVE Database V5
Vendor/Project: langflow-ai
Product: langflow

Description

The '/api/v1/files/images/{flow_id}/{file_name}' endpoint does not enforce any authentication or authorization checks, allowing any unauthenticated user to download images belonging to any flow by knowing (or guessing) the flow ID and file name.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 15:00:00 UTC

Technical Analysis

CVE-2026-5022 identifies a missing authorization vulnerability in the langflow-ai langflow product affecting version 0. The vulnerability exists in the REST API endpoint '/api/v1/files/images/{flow_id}/{file_name}', which serves image files related to AI workflow flows. This endpoint does not enforce any authentication or authorization, allowing unauthenticated users to access image files by supplying a valid flow ID and file name. The root cause is a lack of access control checks (CWE-862), meaning the system fails to verify whether the requester has permission to access the requested resource. Attackers can exploit this by enumerating or guessing flow IDs and file names to download images belonging to other users or projects. The vulnerability impacts confidentiality by exposing potentially sensitive images but does not affect integrity or availability. The CVSS 4.0 vector (AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, high attack complexity, partial attack prerequisites, no privileges or user interaction required, and low confidentiality impact. No patches or known exploits are currently available, but the issue is publicly disclosed. This vulnerability highlights the importance of enforcing strict authentication and authorization on all API endpoints handling sensitive data, especially in AI workflow management tools where images may contain proprietary or sensitive information.

Potential Impact

The primary impact of CVE-2026-5022 is the unauthorized disclosure of image files associated with AI workflow flows in langflow. Organizations using langflow may inadvertently expose sensitive or proprietary images to unauthorized parties, leading to confidentiality breaches. This could result in intellectual property theft, leakage of sensitive project data, or exposure of user information embedded in images. Although the vulnerability does not affect data integrity or system availability, the confidentiality loss can undermine trust in the affected software and may have compliance implications if sensitive data is involved. The attack requires knowledge or guessing of flow IDs and file names, which may limit exploitation but does not eliminate risk, especially if predictable naming conventions are used. The lack of authentication and authorization checks means that any external attacker with network access to the API endpoint can attempt exploitation. This vulnerability could be leveraged as part of a larger attack chain to gather intelligence or conduct social engineering. Given the growing adoption of AI workflow tools, the impact could be significant for organizations relying on langflow for sensitive AI projects.

Mitigation Recommendations

To mitigate CVE-2026-5022, organizations should immediately implement strict authentication and authorization controls on the '/api/v1/files/images/{flow_id}/{file_name}' endpoint. This includes verifying that the requester is authenticated and authorized to access the specific flow and image file. Employ role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms to restrict access to image resources only to legitimate users. Additionally, consider implementing rate limiting and monitoring to detect and prevent enumeration attempts of flow IDs and file names. Review and sanitize file naming conventions to reduce predictability and exposure risk. Conduct a thorough audit of all API endpoints to ensure no other resources lack proper access controls. If possible, isolate sensitive image storage behind additional security layers or encrypt images at rest and in transit. Langflow developers should prioritize releasing a patch to enforce these controls by default. Organizations should also educate developers and administrators on secure API design principles to prevent similar issues. Finally, monitor network traffic for unusual access patterns to the vulnerable endpoint and respond promptly to any suspicious activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2026-03-27T14:24:15.496Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c697e33c064ed76fb722dd

Added to database: 3/27/2026, 2:44:51 PM

Last enriched: 3/27/2026, 3:00:00 PM

Last updated: 3/27/2026, 3:50:47 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses