


Perceptive Security
SOC/SIEM Consultancy

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (Exter…
Published:
23 March 2026 at 23:00:00
Alert date:
24 March 2026 at 20:06:33
Source:
nvd.nist.gov
Web Technologies, Enterprise Applications
Langflow versions 1.2.0 through 1.8.1 contain a critical vulnerability that bypasses the previous patch for CVE-2025-68478. The flaw exists in the LocalStorageService component due to inadequate boundary containment checks. Attackers can exploit the POST /api/v2/files/ endpoint through multipart upload filename manipulation to achieve arbitrary file writes. This vulnerability allows authenticated attackers to write files anywhere on the host system, leading to Remote Code Execution. The issue stems from a defense-in-depth failure where the system relies entirely on HTTP-layer ValidatedFileName dependency. Version 1.9.0 provides an updated fix for this architectural security flaw.
Technical details
Mitigation steps:
Affected products:
Langflow
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33309
https://github.com/langflow-ai/langflow/security/advisories/GHSA-g2j9-7rj2-gm6c
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
