CVE-2026-24055

Langfuse is an open source large language model engineering platform. In versions 3.146.0 and below, the /api/public/slack/install endpoint initiates Slack OAuth using a projectId provided by the client without authentication or authorization. The projectId is preserved throughout the OAuth flow, and the callback stores installations based on this untrusted metadata. This allows an attacker to bind their Slack workspace to any project and potentially receive changes to prompts stored in Langfuse Prompt Management. An attacker can replace existing Prompt Slack Automation integrations or pre-register a malicious one, though the latter requires an authenticated user to unknowingly configure it despite visible workspace and channel indicators in the UI. This issue has been fixed in version 3.147.0.
CVSS

No CVSS.

Configurations

No configuration.

History

22 Jan 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-22 04:16

Updated : 2026-01-26 15:04


NVD link : CVE-2026-24055

Mitre link : CVE-2026-24055

CVE.ORG link : CVE-2026-24055


JSON object : View

Products Affected

No product.

CWE
CWE-284

Improper Access Control