Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5025: CWE-862 Missing Authorization in langflow-ai langflow

0
Medium
VulnerabilityCVE-2026-5025cvecve-2026-5025cwe-862
Published: Fri Mar 27 2026 (03/27/2026, 14:43:00 UTC)
Source: CVE Database V5
Vendor/Project: langflow-ai
Product: langflow

Description

The '/logs' and '/logs-stream' endpoints in the log router allow any authenticated user to read the full application log buffer. These endpoints only require basic authentication ('get_current_active_user') without any privilege checks (e.g., 'is_superuser').

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 15:30:15 UTC

Technical Analysis

CVE-2026-5025 identifies a missing authorization vulnerability (CWE-862) in the langflow-ai langflow product affecting the '/logs' and '/logs-stream' endpoints of the log router. These endpoints allow any user authenticated via basic authentication ('get_current_active_user') to read the entire application log buffer without requiring elevated privileges such as 'is_superuser'. This lack of privilege checks means that users with minimal access rights can retrieve potentially sensitive log data, which may include operational details, user activity, or other confidential information. The vulnerability does not affect integrity or availability but poses a high confidentiality risk. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) reflects that the vulnerability is remotely exploitable over the network with low attack complexity, requires privileges but no user interaction, and impacts confidentiality significantly. No patches or exploits are currently reported, but the exposure of logs can aid attackers in reconnaissance or lateral movement. The affected version is listed as '0', indicating early or initial releases of langflow may be vulnerable. Organizations using langflow should audit their authentication and authorization mechanisms, especially for sensitive endpoints like log access, to prevent unauthorized data disclosure.

Potential Impact

The primary impact of CVE-2026-5025 is unauthorized disclosure of sensitive information contained in application logs. Logs often include details about system operations, user activities, error messages, and potentially sensitive data such as tokens or configuration information. Exposure of such information can facilitate further attacks, including privilege escalation, targeted phishing, or exploitation of other vulnerabilities. Since the vulnerability does not affect integrity or availability, it does not directly allow data modification or service disruption. However, the confidentiality breach can undermine organizational security posture and compliance with data protection regulations. Organizations relying on langflow for AI workflow orchestration or related tasks may face risks of information leakage, especially if logs contain sensitive operational or user data. The vulnerability's ease of exploitation over the network and lack of user interaction requirement increase its risk profile. Although no known exploits exist currently, attackers may develop exploits given the straightforward nature of the missing authorization.

Mitigation Recommendations

To mitigate CVE-2026-5025, organizations should implement strict authorization checks on the '/logs' and '/logs-stream' endpoints, ensuring that only users with appropriate privileges (e.g., superuser or admin roles) can access application logs. This can be achieved by modifying the authentication middleware to verify user roles beyond basic authentication. Additionally, consider restricting access to these endpoints via network controls such as IP whitelisting or VPN access to limit exposure. Regularly audit and sanitize log contents to avoid storing sensitive information unnecessarily. Employ logging best practices, including log encryption at rest and in transit, and ensure logs are stored securely with access controls. Monitor access logs for unusual or unauthorized access attempts to these endpoints. If possible, update langflow to a patched version once available or apply vendor-recommended fixes. Finally, educate developers and administrators about the importance of authorization checks on sensitive endpoints to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
tenable
Date Reserved
2026-03-27T14:36:29.989Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c69ee73c064ed76fb956b0

Added to database: 3/27/2026, 3:14:47 PM

Last enriched: 3/27/2026, 3:30:15 PM

Last updated: 3/27/2026, 11:39:49 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses