EUVD-2026-23745

| CVE-2026-6596 MEDIUM
Unrestricted Upload of File with Dangerous Type (CWE-434)
2026-04-20 VulDB GHSA-vvfc-fp59-m92g
6.9
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
Severity Changed
Apr 20, 2026 - 03:22 NVD
HIGH MEDIUM
CVSS changed
Apr 20, 2026 - 03:22 NVD
7.3 (HIGH) 6.9 (MEDIUM)
Analysis Generated
Apr 20, 2026 - 02:49 vuln.today

DescriptionNVD

A security flaw has been discovered in langflow-ai langflow up to 1.1.0. This issue affects the function create_upload_file of the file src/backend/base/Langflow/api/v1/endpoints.py of the component API Endpoint. The manipulation results in unrestricted upload. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AnalysisAI

Unrestricted file upload in Langflow (langflow-ai) versions up to 1.1.0 allows remote unauthenticated attackers to upload arbitrary files via the create_upload_file API endpoint, potentially leading to remote code execution, data manipulation, and service disruption. Publicly available exploit code exists (CVSS:3.1 E:P) with GIST-hosted POC, elevating immediate risk. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: identify all Langflow deployments and document versions in use; isolate any instances running versions ≤1.1.0 from production networks if upgrading is not immediately feasible. Within 7 days: upgrade to Langflow version 1.2.0 or later (verify vendor release notes for remediation confirmation); if upgrade blocked by dependencies, implement network-level access controls restricting the create_upload_file API endpoint to internal networks only. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23745 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy