PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-3340 Langflow CVE debrief

CVE-2026-3340 is a server-side request forgery (SSRF) issue in IBM Langflow Desktop affecting versions 1.0.0 through 1.8.4. According to the vendor and NVD, an authenticated attacker may be able to make unauthorized requests from the system, which could support network enumeration or other follow-on attacks.

Vendor
Langflow
Product
CVE-2026-3340
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-30
Original CVE updated
2026-05-11
Advisory published
2026-04-30
Advisory updated
2026-05-11

Who should care

Administrators and security owners responsible for IBM Langflow Desktop deployments, especially environments that allow authenticated users to interact with the application and where the host can reach sensitive internal services.

Technical summary

The official NVD record cites a vulnerable CPE for langflow_desktop from 1.0.0 through 1.8.4 and maps the weakness to CWE-918 (SSRF). The published description says an authenticated attacker may be able to send unauthorized requests from the system, creating potential for internal network probing or other abuse. NVD rates the issue 6.5/Medium with CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N.

Defensive priority

Medium. The issue is network-reachable and can be used to pivot the application into making requests on behalf of the host, but the supplied corpus does not indicate code execution, public exploitation, or KEV inclusion.

Recommended defensive actions

  • Review IBM PSIRT advisory for remediation guidance and any vendor-supplied fix or mitigation details.
  • Upgrade or replace affected IBM Langflow Desktop installations once a remediated version is identified by the vendor.
  • Restrict who can authenticate to Langflow Desktop and apply least-privilege access to the application.
  • Limit outbound network access from the Langflow host to only required destinations to reduce SSRF abuse potential.
  • Monitor for unusual server-initiated outbound requests, internal address probing, or other request patterns that could indicate SSRF activity.

Evidence notes

Supported by the NVD record for CVE-2026-3340 and the linked IBM vendor advisory reference. The supplied corpus directly supports the affected version range (1.0.0 through 1.8.4), the SSRF weakness (CWE-918), the authenticated-attacker description, and the CVSS v3.1 vector/score. No fixed version, exploitation details, or KEV status were provided in the corpus.

Official resources

CVE published on 2026-04-30 and later modified on 2026-05-11 in the supplied CVE/NVD timeline. IBM vendor advisory is referenced by the NVD record.