IBM Langflow OSS 1.0.0 through 1.8.4 could allow any user to supply a flow_id to read transaction logs and vertex build data belonging to other users, and to delete persisted vertex build data for another user's flow.

Project Subscriptions

Vendors Products
Langflow Oss Subscribe
Advisories

No advisories yet.

Fixes

Solution

IBM recommends addressing the vulnerability now by upgrading to Langflow OSS 1.9.0 or newer:  https://github.com/langflow-ai/langflow


Workaround

No workaround given by the vendor.

History

Thu, 30 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description IBM Langflow OSS 1.0.0 through 1.8.4 could allow any user to supply a flow_id to read transaction logs and vertex build data belonging to other users, and to delete persisted vertex build data for another user's flow.
Title Monitor API allows cross-user read of transaction logs and deletion of build data via flow_id
First Time appeared Ibm
Ibm langflow Oss
Weaknesses CWE-639
CPEs cpe:2.3:a:ibm:langflow_oss:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:langflow_oss:1.8.4:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm langflow Oss
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-04-30T21:16:10.787Z

Reserved: 2026-04-17T17:59:10.380Z

Link: CVE-2026-6542

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-30T22:16:26.340

Modified: 2026-04-30T22:16:26.340

Link: CVE-2026-6542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses