First published: Mon Jun 10 2024(Updated: )
Langflow allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/langflow | <1.0.15 | 1.0.15 |
Langflow | <=0.6.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37014 is classified as a critical vulnerability due to its potential for remote code execution.
To address CVE-2024-37014, upgrade Langflow to version 1.0.15 or later.
CVE-2024-37014 affects Langflow versions up to and including 0.6.19.
CVE-2024-37014 is a remote code execution vulnerability.
Users of Langflow who have untrusted users accessing the POST /api/v1/custom_component endpoint are vulnerable to CVE-2024-37014.