Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-f43r-cc68-gpx4 | External Control of File Name or Path in Langflow |
Fri, 02 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-610 | |
| CPEs | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* |
Sun, 21 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langflow
Langflow langflow |
|
| Vendors & Products |
Langflow
Langflow langflow |
Fri, 19 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0, if an arbitrary path is specified in the request body's `fs_path`, the server serializes the Flow object into JSON and creates/overwrites a file at that path. There is no path restriction, normalization, or allowed directory enforcement, so absolute paths (e.g., /etc/poc.txt) are interpreted as is. Version 1.7.0 fixes the issue. | |
| Title | Langflow Vulnerable to External Control of File Name or Path | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-19T17:59:42.829Z
Reserved: 2025-12-18T18:29:07.309Z
Link: CVE-2025-68478
Updated: 2025-12-19T17:23:21.407Z
Status : Analyzed
Published: 2025-12-19T18:15:51.623
Modified: 2026-01-02T16:20:53.150
Link: CVE-2025-68478
No data.
OpenCVE Enrichment
Updated: 2025-12-21T21:12:54Z
Github GHSA