Langfuse

5 CVEs product

Monthly

CVE-2026-24055 MEDIUM POC PATCH This Month

Langfuse versions 3.146.0 and below allow unauthenticated attackers to hijack Slack OAuth integrations by injecting arbitrary projectIds into the /api/public/slack/install endpoint, enabling them to bind malicious Slack workspaces to any project and intercept prompt management data. An attacker can replace existing Prompt Slack Automations or pre-register malicious integrations that execute when authenticated users unknowingly configure them. Public exploit code exists for this vulnerability, which affects the DNS and AI/ML components of the Langfuse platform.

Dns AI / ML Langfuse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-65107 MEDIUM This Month

Langfuse is an open source large language model engineering platform. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass CSRF Langfuse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-64504 MEDIUM PATCH This Month

Langfuse is an open source large language model engineering platform. Rated medium severity (CVSS 5.0), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Langfuse
NVD GitHub
CVSS 3.1
5.0
EPSS
0.1%
CVE-2025-59305 HIGH POC This Month

Improper authorization in the background migration endpoints of Langfuse 3.1 before d67b317 allows any authenticated user to invoke migration control functions. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Denial Of Service Langfuse
NVD
CVSS 3.1
7.6
EPSS
0.1%
CVE-2025-9799 LOW POC Monitor

A security flaw has been discovered in Langfuse up to 3.88.0. Rated low severity (CVSS 2.3), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

SSRF Langfuse
NVD GitHub VulDB
CVSS 4.0
2.3
EPSS
0.0%
CVE-2026-24055
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Langfuse versions 3.146.0 and below allow unauthenticated attackers to hijack Slack OAuth integrations by injecting arbitrary projectIds into the /api/public/slack/install endpoint, enabling them to bind malicious Slack workspaces to any project and intercept prompt management data. An attacker can replace existing Prompt Slack Automations or pre-register malicious integrations that execute when authenticated users unknowingly configure them. Public exploit code exists for this vulnerability, which affects the DNS and AI/ML components of the Langfuse platform.

Dns AI / ML Langfuse
NVD GitHub
CVE-2025-65107
EPSS 0% CVSS 6.5
MEDIUM This Month

Langfuse is an open source large language model engineering platform. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass CSRF Langfuse
NVD GitHub
CVE-2025-64504
EPSS 0% CVSS 5.0
MEDIUM PATCH This Month

Langfuse is an open source large language model engineering platform. Rated medium severity (CVSS 5.0), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Langfuse
NVD GitHub
CVE-2025-59305
EPSS 0% CVSS 7.6
HIGH POC This Month

Improper authorization in the background migration endpoints of Langfuse 3.1 before d67b317 allows any authenticated user to invoke migration control functions. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Denial Of Service Langfuse
NVD
CVE-2025-9799
EPSS 0% CVSS 2.3
LOW POC Monitor

A security flaw has been discovered in Langfuse up to 3.88.0. Rated low severity (CVSS 2.3), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

SSRF Langfuse
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy