CVE-2025-34291
High
CVSS 8.8PoC AvailableDescription
Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.
CVSS Score
8.8/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HWeakness Classification (CWE)
Known Exploits
POCReferences (3)
https://github.com/langflow-ai/langflowdisclosure@vulncheck.comhttps://www.obsidiansecurity.com/blog/cve-2025-34291-critical-account-takeover-and-rce-vulnerability-in-the-langflow-ai-agent-workflow-platformdisclosure@vulncheck.comhttps://www.vulncheck.com/advisories/langflow-cors-misconfiguration-to-token-hijack-and-rcedisclosure@vulncheck.com
Risk Assessment
ELEVATEDKnown exploit
Details
- Severity
- High
- CVSS
- 8.8
- CWE
- CWE-346
- Exploit
- POC
- CISA KEV
- No
- Articles
- 1
Timeline
Published
Dec 5, 2025