From 87e8ea6fcb2d65db32a1a98d7a7812999392cb24 Mon Sep 17 00:00:00 2001 From: arkom__ <71601301+ventusfortis@users.noreply.github.com> Date: Fri, 15 May 2026 12:48:19 +0300 Subject: [PATCH] Improve GHSA-vvfc-fp59-m92g --- .../04/GHSA-vvfc-fp59-m92g/GHSA-vvfc-fp59-m92g.json | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/advisories/github-reviewed/2026/04/GHSA-vvfc-fp59-m92g/GHSA-vvfc-fp59-m92g.json b/advisories/github-reviewed/2026/04/GHSA-vvfc-fp59-m92g/GHSA-vvfc-fp59-m92g.json index 5cf8d8ec975f8..d69c87dabad95 100644 --- a/advisories/github-reviewed/2026/04/GHSA-vvfc-fp59-m92g/GHSA-vvfc-fp59-m92g.json +++ b/advisories/github-reviewed/2026/04/GHSA-vvfc-fp59-m92g/GHSA-vvfc-fp59-m92g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vvfc-fp59-m92g", - "modified": "2026-04-24T20:13:26Z", + "modified": "2026-04-24T20:13:27Z", "published": "2026-04-20T03:34:42Z", "aliases": [ "CVE-2026-6596" @@ -9,13 +9,9 @@ "summary": "Langflow: DoS Through Lack of File Size Restriction via Deprecated Unauthenticated File Upload API", "details": "A security flaw has been discovered in langflow-ai langflow up to 1.1.0. This issue affects the function create_upload_file of the file src/backend/base/Langflow/api/v1/endpoints.py of the component API Endpoint. The manipulation results in unrestricted upload. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.", "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" - }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" } ], "affected": [ @@ -32,7 +28,7 @@ "introduced": "0" }, { - "fixed": "1.9.1" + "fixed": "0.9.1" } ] }