CVE-2025-34291

HIGH

CVSS v3

8.8

HIGH

EPSS Score

14.0%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token

Technical Details

CVSS v3 Vector
3.1
Published
12/5/2025
Last Modified
1/16/2026

Frequently Asked Questions

What is CVE-2025-34291?

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token

Is CVE-2025-34291 actively exploited?

Active exploitation of CVE-2025-34291 has not been confirmed. The EPSS score is 14.0%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-34291?

CVE-2025-34291 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.

Is CVE-2025-34291 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.