CVE-2024-7297: Langflow: mass assignment grants super admin access
HIGH PoC AVAILABLE CISA: ATTENDAny authenticated Langflow user can elevate themselves to super admin by injecting role fields into the /api/v1/users API endpoint — no special knowledge required. This gives full control over all flows, stored LLM API keys, and connected AI services. Upgrade to Langflow 1.0.13 immediately and audit existing user roles for unauthorized escalation.
Risk Assessment
HIGH. CVSS 8.8 with network-accessible attack vector, low complexity, and no user interaction makes this trivially exploitable. Langflow is commonly deployed in enterprise AI development environments with access to sensitive LLM API keys, data pipelines, and agentic workflows. Super admin compromise translates directly to full platform takeover with no forensic friction — the attacker simply sends a crafted HTTP request.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| langflow | pip | — | No patch |
Do you use langflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade to Langflow 1.0.13 or later immediately — this is the only complete fix.
-
AUDIT
Query the database or admin panel for all accounts with super admin or elevated roles; flag any unexpected promotions since deployment.
-
NETWORK
If patching is delayed, restrict access to /api/v1/users endpoint via WAF or reverse proxy rule (block PATCH/PUT from non-admin source IPs).
-
ROTATE
After patching, rotate all API keys stored in Langflow — LLM providers, vector DBs, and any external integrations.
-
DETECT
Enable and monitor Langflow audit logs for unexpected role change events; alert on any privilege escalation activity.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-7297?
Any authenticated Langflow user can elevate themselves to super admin by injecting role fields into the /api/v1/users API endpoint — no special knowledge required. This gives full control over all flows, stored LLM API keys, and connected AI services. Upgrade to Langflow 1.0.13 immediately and audit existing user roles for unauthorized escalation.
Is CVE-2024-7297 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-7297, increasing the risk of exploitation.
How to fix CVE-2024-7297?
1. PATCH: Upgrade to Langflow 1.0.13 or later immediately — this is the only complete fix. 2. AUDIT: Query the database or admin panel for all accounts with super admin or elevated roles; flag any unexpected promotions since deployment. 3. NETWORK: If patching is delayed, restrict access to /api/v1/users endpoint via WAF or reverse proxy rule (block PATCH/PUT from non-admin source IPs). 4. ROTATE: After patching, rotate all API keys stored in Langflow — LLM providers, vector DBs, and any external integrations. 5. DETECT: Enable and monitor Langflow audit logs for unexpected role change events; alert on any privilege escalation activity.
What systems are affected by CVE-2024-7297?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, LLM orchestration platforms, RAG pipelines, AI development environments, multi-agent systems.
What is the CVSS score for CVE-2024-7297?
CVE-2024-7297 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 0.26%.
Technical Details
NVD Description
Langflow versions prior to 1.0.13 suffer from a Privilege Escalation vulnerability, allowing a remote and low privileged attacker to gain super admin privileges by performing a mass assignment request on the '/api/v1/users' endpoint.
Exploitation Scenario
An attacker registers or compromises a standard user account on a Langflow instance. They send a PATCH request to /api/v1/users/{user_id} with a JSON body containing an extra field such as 'is_superuser: true' or 'role: superadmin'. Due to missing mass assignment protection, the API binds all request fields directly to the user model and saves the elevated role. The attacker now has super admin access: they can extract all stored LLM API keys from flow configurations, modify existing production flows to exfiltrate processed data, inject malicious steps into AI pipelines affecting downstream users, or pivot to connected vector databases and external services using harvested credentials.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References
- github.com/JoshuaMart/JoshuaMart Exploit
- github.com/fkie-cad/nvd-json-data-feeds Exploit
- tenable.com/security/research/tra-2024-26 Exploit 3rd Party
Timeline
Related Vulnerabilities
CVE-2026-33309 9.9 langflow: Path Traversal enables file access
Same package: langflow CVE-2024-37014 9.8 Langflow: unauthenticated RCE via custom component API
Same package: langflow CVE-2026-27966 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2026-33017 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2024-42835 9.8 Langflow: Unauthenticated RCE via PythonCodeTool
Same package: langflow
AI Threat Alert