CVE-2026-21445 is a critical severity vulnerability with a CVSS score of 9.1. Exploits are available; patches have been released and should be applied urgently.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
Multiple critical API endpoints in Langflow are missing authentication controls, allowing any unauthenticated user to access sensitive user conversation data, transaction histories, and perform destructive operations including message deletion. This affects endpoints handling personal data and system operations that should require proper authorization.
The vulnerability exists in three API endpoints within src/backend/base/langflow/api/v1/monitor.py that are missing the required dependencies=[Depends(get_current_active_user)] authentication dependency:
Affected Endpoints:
GET /api/v1/monitor/messages (Line 61)
@router.get("/messages") # ❌ Missing authentication
async def get_messages(
session: DbSession,
flow_id: Annotated[UUID | None, Query()] = None,
session_id: Annotated[str | None, Query()] = None,
# ... other parameters
) -> list[MessageResponse]:
GET /api/v1/monitor/transactions (Line 183)
@router.get("/transactions") # ❌ Missing authentication
async def get_transactions(
flow_id: Annotated[UUID, Query()],
session: DbSession,
params: Annotated[Params | None, Depends(custom_params)],
) -> Page[TransactionTable]:
DELETE /api/v1/monitor/messages/session/{session_id} (Line 165)
@router.delete("/messages/session/{session_id}", status_code=204) # ❌ Missing authentication
async def delete_messages_session(
session_id: str,
session: DbSession,
):
Inconsistency Evidence: Other endpoints in the same file properly implement authentication:
@router.get("/messages/sessions", dependencies=[Depends(get_current_active_user)]) # ✅ Properly secured
@router.delete("/messages", status_code=204, dependencies=[Depends(get_current_active_user)]) # ✅ Properly secured
Complete reproduction steps to demonstrate the vulnerability:
Prerequisites:
Reproduction Commands:
# 1. Access all user conversations without authentication
curl http://localhost:7860/api/v1/monitor/messages
# 2. Access transaction history without authentication
curl "http://localhost:7860/api/v1/monitor/transactions?flow_id=00000000-0000-0000-0000-000000000000"
# 3. Delete user messages by session without authentication
curl -X DELETE http://localhost:7860/api/v1/monitor/messages/session/00000000-0000-0000-0000-000000000000
Expected vs Actual Behavior:
401 UnauthorizedVulnerability Type: Broken Authentication and Authorization (OWASP Top 10 - A01:2021)
Severity: High
Who is Impacted:
Specific Impacts:
Attack Scenarios:
Recommended Fix: Add authentication dependencies to all affected endpoints:
@router.get("/messages", dependencies=[Depends(get_current_active_user)])
@router.get("/transactions", dependencies=[Depends(get_current_active_user)])
@router.delete("/messages/session/{session_id}", dependencies=[Depends(get_current_active_user)])
Environment:
get_current_active_user| Vendor | Product |
|---|---|
| Langflow | Langflow |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.