CVE-2025-64504

5.0 MEDIUM

📋 TL;DR

This vulnerability in Langfuse allows authenticated users to enumerate names and email addresses of users in other organizations if they know the target organization's ID. It affects Langfuse versions 2.70.0 through 2.95.10 and 3.x through 3.124.0, including both self-hosted deployments and Langfuse Cloud.

💻 Affected Systems

Products:
  • Langfuse
Versions: 2.70.0 through 2.95.10, 3.x through 3.124.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Self-hosted deployments with SSO configured and email/password sign-up disabled have reduced attack surface. Langfuse Cloud (EU, US, HIPAA) was affected until November 1, 2025.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could enumerate all user names and email addresses across all organizations on the same Langfuse instance, potentially enabling targeted phishing or social engineering attacks.

🟠

Likely Case

Limited information disclosure where authenticated users with knowledge of other organization IDs can access member lists of those organizations, exposing names and email addresses but no sensitive customer data.

🟢

If Mitigated

For deployments with SSO configured and email/password sign-up disabled, only internal users authenticated via Enterprise SSO could exploit this to access lists of other internal users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires: 1) Valid Langfuse user account, 2) Knowledge of target orgId, 3) API request to membership tables with modified orgId parameter using valid authentication token.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.95.11 for v2, 3.124.1 for v3

Vendor Advisory: https://github.com/langfuse/langfuse/security/advisories

Restart Required: Yes

Instructions:

1. Identify your Langfuse version. 2. Upgrade to v2.95.11 if on v2.x. 3. Upgrade to v3.124.1 if on v3.x. 4. Restart Langfuse services. 5. Verify the fix is applied.

🔧 Temporary Workarounds

No workarounds available

all

The vendor states there are no known workarounds. Upgrading is required for full mitigation.

🧯 If You Can't Patch

  • Implement strict access controls and monitor API requests to membership endpoints for unusual orgId parameters
  • Consider disabling project membership APIs if not required for your use case

🔍 How to Verify

Check if Vulnerable:

Check Langfuse version: if version is between 2.70.0-2.95.10 or 3.0.0-3.124.0, system is vulnerable.

Check Version:

Check Langfuse dashboard or deployment configuration for version information

Verify Fix Applied:

Verify Langfuse version is 2.95.11 or higher for v2, or 3.124.1 or higher for v3.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests to membership endpoints with orgId parameters different from user's organization
  • Multiple failed authorization attempts on membership APIs

Network Indicators:

  • API calls to /api/*/membership endpoints with modified orgId parameters

SIEM Query:

source="langfuse" AND (uri_path="/api/*/membership" OR endpoint="membership") AND orgId != user_org

🔗 References

📤 Share & Export