<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Langflow (&lt;= 1.8.4) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/langflow--1.8.4/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 18:28:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/langflow--1.8.4/feed.xml" rel="self" type="application/rss+xml"/><item><title>Langflow Knowledge Bases API Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-langflow-path-traversal/</link><pubDate>Tue, 05 May 2026 18:28:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-langflow-path-traversal/</guid><description>A path traversal vulnerability exists in the Langflow Knowledge Bases API (`DELETE /api/v1/knowledge_bases`) that allows an authenticated attacker to delete arbitrary directories on the server's filesystem, leading to data loss and potential service disruption.</description><content:encoded><![CDATA[<p>The Langflow application is susceptible to a critical path traversal vulnerability within its Knowledge Bases API. Specifically, the <code>DELETE /api/v1/knowledge_bases</code> endpoint allows authenticated users to delete knowledge bases using the <code>kb_names</code> parameter. Due to insufficient sanitization of user-supplied input, an attacker can inject path traversal sequences (e.g., <code>../</code>) to manipulate file paths and delete arbitrary directories on the server. This vulnerability affects Langflow versions 1.8.4 and earlier. Successful exploitation can lead to significant data loss, service disruption, and potentially cross-user data compromise if the attacker gains the ability to delete data belonging to other users. Defenders must prioritize patching or mitigating this vulnerability to prevent unauthorized file system modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Langflow application.</li>
<li>The attacker crafts a malicious request to the <code>DELETE /api/v1/knowledge_bases</code> endpoint.</li>
<li>The <code>kb_names</code> parameter in the request contains a path traversal sequence, such as <code>../victim_user/kb_name</code>.</li>
<li>The <code>delete_knowledge_bases_bulk</code> function in <code>src/backend/base/langflow/api/v1/knowledge_bases.py</code> receives the malicious input.</li>
<li>The application constructs a file path by directly concatenating the user-supplied <code>kb_names</code> parameter without proper sanitization.</li>
<li>The <code>shutil.rmtree()</code> function is called with the crafted file path, attempting to recursively delete the directory.</li>
<li>Due to the path traversal sequence, the deletion occurs outside the intended user directory.</li>
<li>Arbitrary directories on the server are deleted, leading to data loss, service disruption, or cross-user data compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can have severe consequences. An attacker could delete critical system files, causing service disruption. They could also delete other users&rsquo; knowledge base data, leading to a cross-user data compromise. Because the application has write access, they can traverse to any directory on the entire filesystem accessible to the Langflow service account. The vulnerability impacts any Langflow instance exposing the vulnerable endpoint to authenticated users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Langflow to a version that includes the fix from <strong>PR #12243</strong> and subsequent backports from <strong>PR #12337</strong>.</li>
<li>Monitor web server logs for requests to the <code>DELETE /api/v1/knowledge_bases</code> endpoint containing path traversal sequences like <code>../</code> to detect exploitation attempts. Use the Sigma rule for detection of path traversal attempts.</li>
<li>Implement strict input validation and sanitization for all user-supplied parameters, especially those used in file path construction.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>langflow</category></item></channel></rss>