CVE-2025-68477
HIGH 7.7Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.0, Langflow provides an API Request component that can issue arbitrary HTTP requests within a flow. This component takes a user-supplied URL, performs only normalization and basic format checks, and then sends the request using a server-side httpx client. It does not block private IP ranges (127[.]0[.]0[.]1, the 10/172/192 ranges) or cloud metadata endpoints (169[.]254[.]169[.]254), and it returns the response body as the result. Because the flow execution endpoints (/api/v1/run, /api/v1/run/advanced) can be invoked with just an API key, if an attacker can control the API Request URL in a flow, non-blind SSRF is possible—accessing internal resources from the server’s network context. This enables requests to, and collection of responses from, internal administrative endpoints, metadata services, and internal databases/services, leading to information disclosure and providing a foothold for further attacks. Version 1.7.0 contains a patch for this issue.
Affected Applications in Environment
5
Flow
v1.3.173.0
7 devices
Flow
v1.3.176.0
9 devices
Flow
v1.3.51.1
1 device
Flow
v1.3.51.0
2 devices
Flow
v1.3.174.0
1 device
Affected Devices
19
118B-13
Windows
118B-14
Windows
118B-15
Windows
118B-18
Windows
DESKTOP-2F2IHK3
Windows
DPADVS-L72018DT
Windows
DPADVS-L72115D7
Windows
DPAGNF-A7412369
Windows
DPAGNF-A741236B
Windows
DPAGNF-A805193T
Windows
DPATHL-835405G
Windows
DPATHL-83540MD
Windows
DPBIOL-MITZI
Windows
DPELED-D81938YB
Windows
DPEMAE-92503DF
Windows
FACHVAC-HP640-2
Windows
FACHVAC-HP640-4
Windows
FACHVAC-HP640-5
Windows
FACHVAC92505LP
Windows