PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-3345 Langflow CVE debrief

CVE-2026-3345 is a directory traversal vulnerability in IBM Langflow Desktop versions 1.8.4 and earlier. A remote attacker can send a specially crafted URL containing "dot dot" path sequences (/../) to access files outside the intended directory scope. The issue is rated CVSS 6.5 (Medium) and primarily impacts confidentiality.

Vendor
Langflow
Product
CVE-2026-3345
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-30
Original CVE updated
2026-05-11
Advisory published
2026-04-30
Advisory updated
2026-05-11

Who should care

Administrators and security teams responsible for IBM Langflow Desktop deployments, especially environments that expose the application to remote users or handle sensitive local files.

Technical summary

The NVD record describes the weakness as CWE-22 (Path Traversal). The vulnerable CPE applies to cpe:2.3:a:langflow:langflow_desktop:*:*:*:*:*:*:*:* through version 1.8.4. The reported attack vector is network-accessible, requires low privileges, and needs no user interaction. Successful exploitation can allow arbitrary file reads through crafted request paths that escape the intended directory boundary.

Defensive priority

Medium

Recommended defensive actions

  • Upgrade IBM Langflow Desktop to a version later than 1.8.4 as soon as a fixed release is available.
  • Restrict access to Langflow Desktop to trusted networks or authenticated administrative users until patched.
  • Review web or proxy logs for requests containing '/../' or similar path traversal indicators.
  • Check whether sensitive files may have been exposed and rotate or protect any impacted credentials or secrets.
  • Follow the IBM PSIRT advisory for vendor guidance and remediation details.

Evidence notes

This debrief is based on the official NVD CVE record and its vendor advisory reference. NVD lists the vulnerability as analyzed, identifies CWE-22, and ties it to IBM Langflow Desktop versions through 1.8.4. The IBM advisory reference is https://www.ibm.com/support/pages/node/7271094. No exploit details beyond the published description were used.

Official resources

Published by the CVE/NVD record on 2026-04-30T22:16:25.337Z and updated on 2026-05-11T17:05:14.423Z.