CVE-2025-57760
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-25

Last updated on: 2025-09-03

Assigner: GitHub, Inc.

Description
Langflow is a tool for building and deploying AI-powered agents and workflows. A privilege escalation vulnerability exists in Langflow containers where an authenticated user with RCE access can invoke the internal CLI command langflow superuser to create a new administrative user. This results in full superuser access, even if the user initially registered through the UI as a regular (non-admin) account. A patched version has not been made public at this time.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-25
Last Modified
2025-09-03
Generated
2026-05-06
AI Q&A
2025-08-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 33 associated CPEs
Vendor Product Version / Range
langflow langflow to 1.5.0 (exc)
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
langflow langflow 1.5.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Langflow containers allows an authenticated user who already has remote code execution (RCE) access to escalate their privileges by using an internal CLI command called 'langflow superuser'. This command lets them create a new administrative user, granting full superuser access even if they initially registered as a regular, non-admin user.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized full superuser access within Langflow, allowing an attacker to gain complete control over the system. This can result in data breaches, unauthorized changes, disruption of services, and potential compromise of sensitive information.


What immediate steps should I take to mitigate this vulnerability?

Since a patched version is not yet publicly available, immediate mitigation steps include restricting authenticated user access to Langflow containers, especially limiting users with remote code execution (RCE) capabilities. Monitor and control usage of the internal CLI command 'langflow superuser' to prevent unauthorized creation of administrative users. Consider isolating or disabling the CLI access until a patch is released.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart