CVE-2025-68478

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0, if an arbitrary path is specified in the request body's `fs_path`, the server serializes the Flow object into JSON and creates/overwrites a file at that path. There is no path restriction, normalization, or allowed directory enforcement, so absolute paths (e.g., /etc/poc.txt) are interpreted as is. Version 1.7.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

History

02 Jan 2026, 16:20

Type Values Removed Values Added
References () https://github.com/langflow-ai/langflow/security/advisories/GHSA-f43r-cc68-gpx4 - () https://github.com/langflow-ai/langflow/security/advisories/GHSA-f43r-cc68-gpx4 - Exploit, Vendor Advisory
CWE CWE-610
First Time Langflow langflow
Langflow
CPE cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

19 Dec 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-19 18:15

Updated : 2026-01-02 16:20


NVD link : CVE-2025-68478

Mitre link : CVE-2025-68478

CVE.ORG link : CVE-2025-68478


JSON object : View

Products Affected

langflow

  • langflow
CWE
CWE-73

External Control of File Name or Path

CWE-610

Externally Controlled Reference to a Resource in Another Sphere