CVE-2025-57760: Langflow: privilege escalation to full superuser via CLI
GHSA-4gv9-mp8m-592r HIGH PoC AVAILABLE CISA: ATTENDAny authenticated Langflow user with code execution access — trivially obtained via Langflow's built-in Python execution nodes — can self-promote to superuser with a single CLI command, gaining full platform control. Patch immediately to langflow 1.5.1 / langflow-base 0.5.1; this is a one-step escalation with no exploitation complexity. Until patched, restrict Langflow to internal networks, audit all superuser accounts for unauthorized entries, and rotate all stored API keys.
Risk Assessment
High effective risk despite low EPSS (0.014%). CVSS 8.8 (Network/Low Complexity/Low Privileges) accurately reflects the trivial exploit path: Langflow's core design includes Python code execution nodes that grant every authenticated user a built-in RCE primitive, collapsing the privilege requirement to near-zero in practice. Internet-exposed Langflow instances — common in AI dev teams — are fully compromised by any registered user. No active exploitation detected yet, but weaponization requires minimal skill.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| langflow | pip | — | No patch |
| langflow | pip | <= 1.5.0 | 1.5.1 |
| langflow-base | pip | <= 0.5.0 | 0.5.1 |
Severity & Risk
Attack Surface
Recommended Action
1 step-
1) PATCH: Update to langflow 1.5.1 or langflow-base 0.5.1 — patches are available (PR #9152, commit c188ec1). 2) AUDIT: Immediately enumerate all superuser accounts; any account not explicitly provisioned by an admin is suspect. 3) ROTATE: Treat all API keys and credentials stored in Langflow as compromised until audited — rotate OpenAI, Anthropic, and any other stored keys. 4) RESTRICT: Langflow must not be internet-exposed; enforce VPN or network-level access controls. 5) MONITOR: Alert on 'langflow superuser' CLI invocations in container stdout/stderr logs. 6) HARDEN: Run Langflow containers with least-privilege OS permissions to limit blast radius of code execution.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-57760?
Any authenticated Langflow user with code execution access — trivially obtained via Langflow's built-in Python execution nodes — can self-promote to superuser with a single CLI command, gaining full platform control. Patch immediately to langflow 1.5.1 / langflow-base 0.5.1; this is a one-step escalation with no exploitation complexity. Until patched, restrict Langflow to internal networks, audit all superuser accounts for unauthorized entries, and rotate all stored API keys.
Is CVE-2025-57760 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2025-57760, increasing the risk of exploitation.
How to fix CVE-2025-57760?
1) PATCH: Update to langflow 1.5.1 or langflow-base 0.5.1 — patches are available (PR #9152, commit c188ec1). 2) AUDIT: Immediately enumerate all superuser accounts; any account not explicitly provisioned by an admin is suspect. 3) ROTATE: Treat all API keys and credentials stored in Langflow as compromised until audited — rotate OpenAI, Anthropic, and any other stored keys. 4) RESTRICT: Langflow must not be internet-exposed; enforce VPN or network-level access controls. 5) MONITOR: Alert on 'langflow superuser' CLI invocations in container stdout/stderr logs. 6) HARDEN: Run Langflow containers with least-privilege OS permissions to limit blast radius of code execution.
What systems are affected by CVE-2025-57760?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, LLM orchestration platforms, AI workflow automation.
What is the CVSS score for CVE-2025-57760?
CVE-2025-57760 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 0.01%.
Technical Details
NVD Description
Langflow is a tool for building and deploying AI-powered agents and workflows. A privilege escalation vulnerability exists in Langflow containers where an authenticated user with RCE access can invoke the internal CLI command langflow superuser to create a new administrative user. This results in full superuser access, even if the user initially registered through the UI as a regular (non-admin) account. A patched version has not been made public at this time.
Exploitation Scenario
Attacker registers a standard user account on an internet-exposed Langflow instance (or compromises an existing low-privilege account). They create a workflow with a Python code execution node containing: `import subprocess; subprocess.run(['langflow', 'superuser', '--username', 'backdoor', '--password', 'Attacker123!'])`. Running the flow executes the CLI command inside the container, creating a new superuser. The attacker authenticates as superuser, exports all stored LLM API keys, modifies production AI workflows to exfiltrate sensitive data processed by agents, and uses stored database credentials to pivot laterally — entire chain completable in under 5 minutes with no specialized AI/ML knowledge.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References
- github.com/advisories/GHSA-4gv9-mp8m-592r
- github.com/langflow-ai/langflow/pull/9152
- github.com/langflow-ai/langflow/pull/9152 Patch
- github.com/langflow-ai/langflow/commit/c188ec113c9ca46154ad01d0eded1754cc6bef97 Patch
- github.com/langflow-ai/langflow/security/advisories/GHSA-4gv9-mp8m-592r 3rd Party
- github.com/ARPSyndicate/cve-scores Exploit
- github.com/Aimtech7/web-test2 Exploit
- github.com/AngelPalominoF/Martina-IA Exploit
- github.com/Gideongideon5/langflow-agent Exploit
- github.com/GovindMalviya/awesome-langflow Exploit
- github.com/ILYESS24/langflow2.0 Exploit
- github.com/IhorKondratenko/langflow Exploit
- github.com/Pawan22104168/Langflow_UI Exploit
- github.com/Rahu7p/MyLangflow Exploit
- github.com/Tetsuro-Copa/langflow Exploit
- github.com/aloewright/langflow Exploit
- github.com/arsharma2005/adding-button Exploit
- github.com/aryan-spanda/langflow-main Exploit
- github.com/damonfmcmillan/langflow Exploit
- github.com/khulnasoft/aiexec Exploit
- github.com/langflow-ai/langflow Exploit
- github.com/tonyistark/AIBuilder Exploit
- github.com/waldirjunior/teste-context-langflow Exploit
Timeline
Related Vulnerabilities
CVE-2026-33309 9.9 langflow: Path Traversal enables file access
Same package: langflow CVE-2024-37014 9.8 Langflow: unauthenticated RCE via custom component API
Same package: langflow CVE-2026-27966 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2026-33017 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2024-42835 9.8 Langflow: Unauthenticated RCE via PythonCodeTool
Same package: langflow
AI Threat Alert