<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-6596 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6596/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 20 Apr 2026 03:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6596/feed.xml" rel="self" type="application/rss+xml"/><item><title>Langflow Unrestricted File Upload Vulnerability (CVE-2026-6596)</title><link>https://feed.craftedsignal.io/briefs/2026-04-langflow-unrestricted-upload/</link><pubDate>Mon, 20 Apr 2026 03:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-langflow-unrestricted-upload/</guid><description>An unrestricted file upload vulnerability in langflow-ai langflow versions up to 1.1.0 allows remote attackers to execute arbitrary code via the create_upload_file function in the API Endpoint.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-6596, has been discovered in langflow-ai langflow, affecting versions up to 1.1.0. The vulnerability resides within the <code>create_upload_file</code> function of the <code>src/backend/base/Langflow/api/v1/endpoints.py</code> file, specifically in the API Endpoint component. This flaw allows for unrestricted file uploads, potentially enabling attackers to upload and execute malicious files on the server. The vulnerability is remotely exploitable and an exploit has been publicly released, increasing the risk of widespread exploitation. The vendor was notified, but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Langflow instance running a vulnerable version (&lt;= 1.1.0).</li>
<li>The attacker sends a crafted HTTP POST request to the <code>create_upload_file</code> API endpoint.</li>
<li>The request includes a malicious file disguised with a permissible extension or without proper validation.</li>
<li>The <code>create_upload_file</code> function fails to adequately validate the uploaded file type or size.</li>
<li>The malicious file is written to the server&rsquo;s file system in an accessible location.</li>
<li>The attacker crafts a second request to execute the uploaded malicious file. This could involve accessing the file directly via a web browser or triggering its execution through other server-side processes.</li>
<li>Successful execution of the file grants the attacker arbitrary code execution on the server.</li>
<li>The attacker leverages code execution to compromise the system, potentially leading to data exfiltration, service disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to gain complete control over the affected Langflow instance. This could lead to the compromise of sensitive data, disruption of services, and potential further attacks on other systems within the network. Given the ease of exploitation and the availability of a public exploit, organizations using vulnerable versions of Langflow are at significant risk. The impact would depend on the deployment and data handled by the Langflow installation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Langflow to a version higher than 1.1.0 to patch CVE-2026-6596.</li>
<li>Implement the Sigma rule <code>Detect Suspicious File Uploads to Langflow API</code> to detect exploitation attempts targeting the <code>create_upload_file</code> endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>/api/v1/upload</code> endpoint, as this is the likely path for exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-6596</category><category>unrestricted-upload</category><category>langflow</category></item></channel></rss>