CVE-2026-24055
Unknown Unknown - Not Provided
OAuth Authorization Bypass in Langfuse Enables Slack Integration Hijack

Publication date: 2026-01-22

Last updated on: 2026-02-17

Assigner: GitHub, Inc.

Description
Langfuse is an open source large language model engineering platform. In versions 3.146.0 and below, the /api/public/slack/install endpoint initiates Slack OAuth using a projectId provided by the client without authentication or authorization. The projectId is preserved throughout the OAuth flow, and the callback stores installations based on this untrusted metadata. This allows an attacker to bind their Slack workspace to any project and potentially receive changes to prompts stored in Langfuse Prompt Management. An attacker can replace existing Prompt Slack Automation integrations or pre-register a malicious one, though the latter requires an authenticated user to unknowingly configure it despite visible workspace and channel indicators in the UI. This issue has been fixed in version 3.147.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-02-17
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
langfuse langfuse From 3.89.0 (inc) to 3.147.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Langfuse versions 3.146.0 and below involves the /api/public/slack/install endpoint, which initiates Slack OAuth using a projectId provided by the client without any authentication or authorization. Because the projectId is preserved throughout the OAuth flow and used to store installations, an attacker can link their Slack workspace to any victim project by supplying a victim's projectId. This allows the attacker to receive prompt updates sent to Slack if the victim project has existing Prompt Slack Automations configured. The attacker cannot configure automations themselves but can replace or pre-register Slack integrations that may expose prompt data. The issue was fixed in version 3.147.0 by enforcing authentication and authorization checks on this endpoint. [2, 3]


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker to link their Slack workspace to your Langfuse project without your authorization. If your project has existing Prompt Slack Automations, the attacker could receive prompt updates intended for your team, potentially exposing sensitive prompt data managed by Langfuse. Although the attacker cannot configure automations themselves, they can intercept prompt notifications and replace existing Slack integrations. This could lead to unauthorized disclosure of prompt content and disruption of your Slack automation workflows. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability potentially exposes prompt data managed by Langfuse to unauthorized Slack workspaces. However, it does not affect Langfuse Tracing data or LLM-as-a-Judge data, so personally identifiable information (PII) is not impacted. Therefore, while there is a risk of unauthorized data exposure, the vulnerability does not directly compromise PII or sensitive personal data governed by regulations like GDPR or HIPAA. Organizations should still review Slack integrations and access controls to maintain compliance and prevent unauthorized data sharing. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for unauthorized Slack OAuth installations initiated via the /api/public/slack/install endpoint without authentication. You can check your server logs for unauthenticated or unauthorized requests to this endpoint, especially those including a projectId parameter. Look for HTTP 401 Unauthorized or 403 Forbidden responses indicating enforcement of authentication and authorization after patching. Additionally, review audit logs for Slack integration creation events to identify unexpected or suspicious installations. Specific commands depend on your logging setup, but for example, using grep on server logs: `grep '/api/public/slack/install' /path/to/access.log | grep -v '401'` to find potentially unauthorized calls before patching, or `grep 'Slack integration created' /path/to/audit.log` to review integration events. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Langfuse to version 3.147.0 or later, where the vulnerability is fixed by enforcing authentication and authorization on the /api/public/slack/install endpoint. Additionally, review existing Slack integrations in your project settings to ensure only authorized Slack workspaces are linked. Optionally, reconnect Slack workspaces to enforce proper authorization. Monitor audit logs for any suspicious Slack integration creation events and revoke any unauthorized Slack workspace links. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart