Home

Description

A security vulnerability has been detected in langflow-ai langflow up to 1.8.3. The affected element is the function create_project/encrypt_auth_settings of the file src/backend/base/Langflow/api/v1/projects.py of the component Project Creation Endpoint. Such manipulation of the argument auth_settings leads to cleartext storage in a file or on disk. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-04-19 | Published 2026-04-20 | Updated 2026-04-20 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Cleartext Storage in a File or on Disk

Cleartext Storage of Sensitive Information

Product status

1.8.0
affected

1.8.1
affected

1.8.2
affected

1.8.3
affected

Timeline

2026-04-19:Advisory disclosed
2026-04-19:VulDB entry created
2026-04-19:VulDB entry last update

Credits

Eric-f (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/358233 (VDB-358233 | langflow-ai langflow Project Creation Endpoint projects.py encrypt_auth_settings cleartext storage in file) vdb-entry technical-description

vuldb.com/vuln/358233/cti (VDB-358233 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/791921 (Submit #791921 | Langflow <= 1.8.3 CWE-311: Missing Encryption of Sensitive Data) third-party-advisory

gist.github.com/...user2025/77adb3486c06c635ae4b09a3eaf90213 exploit

cve.org (CVE-2026-6598)

nvd.nist.gov (CVE-2026-6598)

Download JSON