IBM Langflow OSS 1.0.0 through 1.8.4 could allow any user to supply a flow_id to read transaction logs and vertex build data belonging to other users, and to delete persisted vertex build data for another user's flow.

Project Subscriptions

Vendors Products
Langflow Oss Subscribe
Advisories

No advisories yet.

Fixes

Solution

IBM recommends addressing the vulnerability now by upgrading to Langflow OSS 1.9.0 or newer:  https://github.com/langflow-ai/langflow


Workaround

No workaround given by the vendor.

History

Fri, 01 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description IBM Langflow OSS 1.0.0 through 1.8.4 could allow any user to supply a flow_id to read transaction logs and vertex build data belonging to other users, and to delete persisted vertex build data for another user's flow.
Title Monitor API allows cross-user read of transaction logs and deletion of build data via flow_id
First Time appeared Ibm
Ibm langflow Oss
Weaknesses CWE-639
CPEs cpe:2.3:a:ibm:langflow_oss:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:langflow_oss:1.8.4:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm langflow Oss
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-05-01T15:00:43.375Z

Reserved: 2026-04-17T17:59:10.380Z

Link: CVE-2026-6542

cve-icon Vulnrichment

Updated: 2026-05-01T15:00:25.233Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-30T22:16:26.340

Modified: 2026-05-01T15:27:15.287

Link: CVE-2026-6542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T08:15:16Z

Weaknesses