Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2026-26 |
|
Mon, 30 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Langflow
Langflow langflow |
|
| Vendors & Products |
Langflow
Langflow langflow |
Fri, 27 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The 'POST /api/v2/files' endpoint does not sanitize the 'filename' parameter from the multipart form data, allowing an attacker to write files to arbitrary locations on the filesystem using path traversal sequences ('../'). | |
| Title | Langflow - Path Traversal Arbitrary File Write via upload_user_file | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2026-03-27T15:11:42.918Z
Reserved: 2026-03-27T14:51:30.515Z
Link: CVE-2026-5027
Updated: 2026-03-27T15:11:27.738Z
Status : Awaiting Analysis
Published: 2026-03-27T15:17:04.743
Modified: 2026-03-30T13:26:29.793
Link: CVE-2026-5027
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:59:36Z