Skip to content
Threat Feed
high advisory

Langflow Path Traversal Vulnerability (CVE-2026-33497)

A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.

Langflow, a tool designed for building and deploying AI-powered agents and workflows, is vulnerable to a path traversal attack (CVE-2026-33497) in versions prior to 1.7.1. The vulnerability resides within the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint. Due to inadequate filtering of the folder_name and file_name parameters, an attacker can manipulate these inputs to traverse directories and potentially access sensitive files, including…

Detection coverage 2

Detect Langflow Path Traversal Attempt

high

Detects attempts to exploit the path traversal vulnerability (CVE-2026-33497) in Langflow by monitoring for path traversal sequences in requests to the /profile_pictures endpoint.

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detect Access to Sensitive Files via Path Traversal

critical

Detects access attempts to common sensitive files (e.g., /etc/passwd) via path traversal in web server logs. Can be used to detect successful exploitation of CVE-2026-33497 in Langflow and other path traversal vulnerabilities.

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →