CVE-2026-4502
Directory Traversal in IBM Langflow Desktop
Publication date: 2026-04-30
Last updated on: 2026-04-30
Assigner: IBM Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | langflow_desktop | From 1.2.0 (inc) to 1.8.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects IBM Langflow Desktop versions 1.2.0 through 1.8.4. It allows an authenticated attacker to perform directory traversal on the system by sending a specially crafted URL request containing "dot dot" sequences (/../). This can enable the attacker to write arbitrary files on the system.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an authenticated attacker to write arbitrary files on your system. This could lead to unauthorized modification of files, potential disruption of system operations, or further exploitation depending on what files are overwritten.