PT-2026-39011 · Langfuse · Langfuse

Mustafabilgici

·

Published

2026-05-08

·

Updated

2026-05-08

·

CVE-2026-41487

CVSS v4.0

5.3

Medium

VectorAV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions Langfuse versions 3.68.0 through 3.166.0
Description A role-based access control flaw exists in the LLM connection update flow. An authenticated user with the "member" role in a project can request an update to an existing LLM connection by changing the baseUrl to one controlled by an attacker. This causes the system to reuse the stored provider secret and redirect the test request to the attacker-controlled endpoint, potentially exposing the plaintext provider LLM API key for that connection.
Recommendations Update to version 3.167.0.

Fix

Improper Access Control

Weakness Enumeration

Related Identifiers

CVE-2026-41487

Affected Products

Langfuse