PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-4502 Langflow CVE debrief

CVE-2026-4502 is an authenticated directory traversal issue in IBM Langflow Desktop. According to the supplied NVD and IBM PSIRT references, specially crafted URL requests containing "../" sequences can escape intended paths and write arbitrary files on the system. The vulnerable range in the supplied record is Langflow Desktop 1.2.0 through 1.8.4.

Vendor
Langflow
Product
CVE-2026-4502
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-30
Original CVE updated
2026-05-11
Advisory published
2026-04-30
Advisory updated
2026-05-11

Who should care

Administrators and security teams responsible for IBM Langflow Desktop deployments in the affected version range should review this immediately, especially if authenticated users are not fully trusted or if the application runs with elevated filesystem permissions.

Technical summary

The supplied record classifies this as CWE-22 (path traversal). The NVD CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N, which indicates a network-reachable issue that requires low privileges, no user interaction, and can cause high integrity impact. The described behavior is directory traversal leading to arbitrary file write through specially crafted URL requests using dot-dot sequences (/../).

Defensive priority

Medium to high for exposed deployments: the issue is remotely reachable and can lead to arbitrary file writes, but it requires authenticated access and the supplied CVSS shows no confidentiality or availability impact.

Recommended defensive actions

  • Inventory IBM Langflow Desktop installations and confirm whether any instance is running versions 1.2.0 through 1.8.4.
  • Follow the IBM PSIRT advisory referenced by NVD for remediation guidance and deploy the vendor-recommended fixed release or mitigation once confirmed in official guidance.
  • Limit authenticated access to trusted users only, and apply least-privilege filesystem permissions to reduce the impact of unauthorized file writes.
  • Monitor for unexpected file creation or path anomalies around Langflow Desktop paths, and review logs for suspicious requests containing '/../' patterns.
  • If possible, isolate the application with OS, container, or application sandbox controls that restrict write access outside approved directories.

Evidence notes

The supplied official sources are consistent: NVD marks the record as analyzed, cites IBM PSIRT as the vendor advisory source, and lists affected versions for cpe:2.3:a:langflow:langflow_desktop from 1.2.0 through 1.8.4. The CVSS vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N and CWE-22 directly support the summary of authenticated directory traversal with integrity impact. No KEV listing is provided in the supplied enrichment.

Official resources

CVE published 2026-04-30T21:16:33.533Z and modified 2026-05-11T17:06:21.467Z. No KEV listing or ransomware campaign association is provided in the supplied enrichment.