PatchSiren cyber security CVE debrief
CVE-2026-3340 Langflow CVE debrief
CVE-2026-3340 is a server-side request forgery (SSRF) issue in IBM Langflow Desktop affecting versions 1.0.0 through 1.8.4. According to the vendor and NVD, an authenticated attacker may be able to make unauthorized requests from the system, which could support network enumeration or other follow-on attacks.
- Vendor
- Langflow
- Product
- CVE-2026-3340
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-30
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-04-30
- Advisory updated
- 2026-05-11
Who should care
Administrators and security owners responsible for IBM Langflow Desktop deployments, especially environments that allow authenticated users to interact with the application and where the host can reach sensitive internal services.
Technical summary
The official NVD record cites a vulnerable CPE for langflow_desktop from 1.0.0 through 1.8.4 and maps the weakness to CWE-918 (SSRF). The published description says an authenticated attacker may be able to send unauthorized requests from the system, creating potential for internal network probing or other abuse. NVD rates the issue 6.5/Medium with CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N.
Defensive priority
Medium. The issue is network-reachable and can be used to pivot the application into making requests on behalf of the host, but the supplied corpus does not indicate code execution, public exploitation, or KEV inclusion.
Recommended defensive actions
- Review IBM PSIRT advisory for remediation guidance and any vendor-supplied fix or mitigation details.
- Upgrade or replace affected IBM Langflow Desktop installations once a remediated version is identified by the vendor.
- Restrict who can authenticate to Langflow Desktop and apply least-privilege access to the application.
- Limit outbound network access from the Langflow host to only required destinations to reduce SSRF abuse potential.
- Monitor for unusual server-initiated outbound requests, internal address probing, or other request patterns that could indicate SSRF activity.
Evidence notes
Supported by the NVD record for CVE-2026-3340 and the linked IBM vendor advisory reference. The supplied corpus directly supports the affected version range (1.0.0 through 1.8.4), the SSRF weakness (CWE-918), the authenticated-attacker description, and the CVSS v3.1 vector/score. No fixed version, exploitation details, or KEV status were provided in the corpus.
Official resources
-
CVE-2026-3340 CVE record
CVE.org
-
CVE-2026-3340 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE published on 2026-04-30 and later modified on 2026-05-11 in the supplied CVE/NVD timeline. IBM vendor advisory is referenced by the NVD record.