Chained Vulnerability in Langflow AI Platform Exposes Accounts and Enables Remote Code Execution
CVE-2025-34291
Key Information:
Badges
What is CVE-2025-34291?
Langflow, specifically versions up to and including 1.6.9, is affected by a critical security issue stemming from a chained vulnerability. This flaw enables attackers to hijack user accounts and execute arbitrary code remotely. It arises from an overly permissive Cross-Origin Resource Sharing (CORS) configuration combined with a refresh token cookie that lacks proper SameSite attributes. As a result, a malicious site can make cross-origin requests with user credentials, allowing attackers to acquire fresh access and refresh tokens. These tokens provide unauthorized access to sensitive endpoints, including built-in functionalities capable of executing arbitrary code, leading to complete system compromise.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Langflow 0 <= 1.6.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
12% chance of being exploited in the next 30 days.
CVSS V4
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
