PT-2026-39011 · Langfuse · Langfuse
Mustafabilgici
·
Published
2026-05-08
·
Updated
2026-05-08
·
CVE-2026-41487
CVSS v4.0
5.3
Medium
| Vector | AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
Langfuse versions 3.68.0 through 3.166.0
Description
A role-based access control flaw exists in the LLM connection update flow. An authenticated user with the "member" role in a project can request an update to an existing LLM connection by changing the
baseUrl to one controlled by an attacker. This causes the system to reuse the stored provider secret and redirect the test request to the attacker-controlled endpoint, potentially exposing the plaintext provider LLM API key for that connection.Recommendations
Update to version 3.167.0.
Fix
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Langfuse