Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes
HomeCVEs

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeCVEsCVE-2026-21445

CVE-2026-21445

Published: January 29, 2026
Last updated:15 hours ago (January 29, 2026)
Exploit: YesZero-day: NoPatch: YesTrend: Neutral
TL;DR
Updated January 29, 2026

CVE-2026-21445 is a critical severity vulnerability with a CVSS score of 9.1. Exploits are available; patches have been released and should be applied urgently.

Key Points
  • 1Critical severity (CVSS 9.1/10)
  • 2Public exploits are available
  • 3Vendor patches are available
  • 4Strobes Priority Score: 798/1000 (High)
  • 5Affects products from: Langflow
Severity Scores
CVSS v39.1
CVSS v20.0
Priority Score798.0
EPSS Score0.0
Critical
Exploitation LikelihoodMinimal
0.00%EPSS

Very low probability of exploitation

Monitor and patch as resources allow
0.00%
EPSS
9.1
CVSS
Yes
Exploit
Yes
Patch
High Priority
exploit exists • critical severity

EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.

Description

Summary

Multiple critical API endpoints in Langflow are missing authentication controls, allowing any unauthenticated user to access sensitive user conversation data, transaction histories, and perform destructive operations including message deletion. This affects endpoints handling personal data and system operations that should require proper authorization.

Details

The vulnerability exists in three API endpoints within src/backend/base/langflow/api/v1/monitor.py that are missing the required dependencies=[Depends(get_current_active_user)] authentication dependency:

Affected Endpoints:

  1. GET /api/v1/monitor/messages (Line 61)

    @router.get("/messages")  # ❌ Missing authentication
    async def get_messages(
        session: DbSession,
        flow_id: Annotated[UUID | None, Query()] = None,
        session_id: Annotated[str | None, Query()] = None,
        # ... other parameters
    ) -> list[MessageResponse]:
    
  2. GET /api/v1/monitor/transactions (Line 183)

    @router.get("/transactions")  # ❌ Missing authentication
    async def get_transactions(
        flow_id: Annotated[UUID, Query()],
        session: DbSession,
        params: Annotated[Params | None, Depends(custom_params)],
    ) -> Page[TransactionTable]:
    
  3. DELETE /api/v1/monitor/messages/session/{session_id} (Line 165)

    @router.delete("/messages/session/{session_id}", status_code=204)  # ❌ Missing authentication
    async def delete_messages_session(
        session_id: str,
        session: DbSession,
    ):
    

Inconsistency Evidence: Other endpoints in the same file properly implement authentication:

@router.get("/messages/sessions", dependencies=[Depends(get_current_active_user)])  # ✅ Properly secured
@router.delete("/messages", status_code=204, dependencies=[Depends(get_current_active_user)])  # ✅ Properly secured

PoC

Complete reproduction steps to demonstrate the vulnerability:

Prerequisites:

  1. Start a Langflow server instance
  2. Ensure no authentication headers or API keys are provided

Reproduction Commands:

# 1. Access all user conversations without authentication
curl http://localhost:7860/api/v1/monitor/messages

# 2. Access transaction history without authentication
curl "http://localhost:7860/api/v1/monitor/transactions?flow_id=00000000-0000-0000-0000-000000000000"

# 3. Delete user messages by session without authentication
curl -X DELETE http://localhost:7860/api/v1/monitor/messages/session/00000000-0000-0000-0000-000000000000

Expected vs Actual Behavior:

  • Expected: All requests should return 401 Unauthorized
  • Actual: All requests return successful responses with sensitive data or perform destructive operations

Impact

Vulnerability Type: Broken Authentication and Authorization (OWASP Top 10 - A01:2021)

Severity: High

Who is Impacted:

  • All Langflow users: Personal conversation data exposed to unauthorized access
  • System administrators: Transaction logs disclosed

Specific Impacts:

  1. Data Breach: Unauthorized access to user conversations containing potentially sensitive personal information
  2. Privacy Violation: Transaction histories and user activity patterns exposed without consent
  3. Data Destruction: Malicious actors can delete user conversation histories without authorization
  4. Compliance Risk: Potential violations of data protection regulations (GDPR, CCPA, etc.)
  5. System Intelligence: Attackers can gather information about system usage patterns and user behavior

Attack Scenarios:

  • Malicious users accessing proprietary conversation data
  • Malicious users deleting other users' conversation histories
  • Automated scraping of all user conversations for data harvesting
  • Reconnaissance attacks to understand system architecture and usage patterns

Recommended Fix: Add authentication dependencies to all affected endpoints:

@router.get("/messages", dependencies=[Depends(get_current_active_user)])
@router.get("/transactions", dependencies=[Depends(get_current_active_user)])
@router.delete("/messages/session/{session_id}", dependencies=[Depends(get_current_active_user)])

Environment:

  • Langflow Version: Current main branch
  • Affected Components: API v1 monitoring endpoints
  • Authentication System: FastAPI dependency injection with get_current_active_user
<img width="1908" height="1029" alt="25-090901" src="https://github.com/user-attachments/assets/44bd03b4-6ada-45b7-b81b-9cb83747172b" />
CVSS v3 Breakdown
Attack Vector:Network
Attack Complexity:Local
Privileges Required:Network
User Interaction:Network
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability:Network
Exploit References
GitHub
Patch References
Github.comGithub.comSecurity [email protected]
Trend Analysis
Neutral
Vulnerable Products
VendorProduct
LangflowLangflow
Advisories
GitHub Advisory
NVD: Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0.dev45, multiple critical API endpoints in Langflow are missing authentication controls. The issue allows any unauthenticated user to access sensitive user conversation data, transaction histories, and perform destructive operations including message deletion. This affects endpoints handling personal data and system operations that should require proper authorization. Version 1.7.0.dev45 contains a patch.
Cite This Page
APA Format
Strobes VI. (2026). CVE-2026-21445 - CVE Details and Analysis. Strobes VI. Retrieved January 29, 2026, from https://vi.strobes.co/cve/CVE-2026-21445
Quick copy link + title

Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.