Home

Description

AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weakness through browser-driven or local cross-origin requests to abuse the localhost API and enable attack chains against the local control plane.

PUBLISHED Reserved 2026-04-29 | Published 2026-04-29 | Updated 2026-04-29 | Assigner VulnCheck




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 4.4CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-346: Origin Validation Error

Product status

Default status
unaffected

Any version before 1667fa3
affected

Credits

Chia Min Jun Lennon finder

References

github.com/berabuddies/agentflow/pull/18 exploit

github.com/berabuddies/agentflow/pull/18

github.com/berabuddies/agentflow/commit/1667fa3 patch

www.vulncheck.com/...-web-api-content-type-validation-bypass third-party-advisory

cve.org (CVE-2026-7439)

nvd.nist.gov (CVE-2026-7439)

Download JSON