Langflow Path Traversal Vulnerability (CVE-2026-33497)
A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.
Langflow, a tool designed for building and deploying AI-powered agents and workflows, is vulnerable to a path traversal attack (CVE-2026-33497) in versions prior to 1.7.1. The vulnerability resides within the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint. Due to inadequate filtering of the folder_name and file_name parameters, an attacker can manipulate these inputs to traverse directories and potentially access sensitive files, including…
Detection coverage 2
Detect Langflow Path Traversal Attempt
highDetects attempts to exploit the path traversal vulnerability (CVE-2026-33497) in Langflow by monitoring for path traversal sequences in requests to the /profile_pictures endpoint.
Detect Access to Sensitive Files via Path Traversal
criticalDetects access attempts to common sensitive files (e.g., /etc/passwd) via path traversal in web server logs. Can be used to detect successful exploitation of CVE-2026-33497 in Langflow and other path traversal vulnerabilities.
Detection queries are kept inside the platform. Get full rules →