IBM Langflow OSS 1.0.0 through 1.8.4 could allow any user to supply a flow_id to read transaction logs and vertex build data belonging to other users, and to delete persisted vertex build data for another user's flow.
Advisories
No advisories yet.
Fixes
Solution
IBM recommends addressing the vulnerability now by upgrading to Langflow OSS 1.9.0 or newer: https://github.com/langflow-ai/langflow
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7270886 |
|
History
Thu, 30 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Langflow OSS 1.0.0 through 1.8.4 could allow any user to supply a flow_id to read transaction logs and vertex build data belonging to other users, and to delete persisted vertex build data for another user's flow. | |
| Title | Monitor API allows cross-user read of transaction logs and deletion of build data via flow_id | |
| First Time appeared |
Ibm
Ibm langflow Oss |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:ibm:langflow_oss:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:langflow_oss:1.8.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm langflow Oss |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2026-04-30T21:16:10.787Z
Reserved: 2026-04-17T17:59:10.380Z
Link: CVE-2026-6542
No data.
Status : Received
Published: 2026-04-30T22:16:26.340
Modified: 2026-04-30T22:16:26.340
Link: CVE-2026-6542
No data.
OpenCVE Enrichment
No data.
Weaknesses