CVE-2026-24055

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to bind their Slack workspace to any Langfuse project via the Slack OAuth endpoint. This could enable unauthorized access to prompt management changes and potentially replace existing Slack integrations. All Langfuse deployments running versions 3.146.0 or below are affected.

💻 Affected Systems

Products:
  • Langfuse
Versions: 3.146.0 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments with Slack integration enabled or accessible via the vulnerable endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains unauthorized access to sensitive prompt management data and replaces legitimate Slack integrations, potentially intercepting or manipulating AI prompt notifications.

🟠

Likely Case

Unauthorized Slack workspace binding to projects, potentially disrupting legitimate Slack automation workflows.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place, though unauthorized access attempts may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires basic understanding of OAuth flows but no authentication to Langfuse.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.147.0

Vendor Advisory: https://github.com/langfuse/langfuse/security/advisories/GHSA-pvq7-vvfj-p98x

Restart Required: Yes

Instructions:

1. Update Langfuse to version 3.147.0 or higher. 2. Restart the Langfuse service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable Slack Integration Endpoint

all

Block access to the vulnerable /api/public/slack/install endpoint

# Add to web server config (nginx example):
location /api/public/slack/install { deny all; }

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to the /api/public/slack/install endpoint
  • Monitor logs for unauthorized access attempts to Slack OAuth endpoints

🔍 How to Verify

Check if Vulnerable:

Check Langfuse version via admin interface or API. If version ≤ 3.146.0, system is vulnerable.

Check Version:

curl -s http://localhost:3000/api/public/health | grep version

Verify Fix Applied:

Confirm version is ≥ 3.147.0 and test that unauthorized projectId binding is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /api/public/slack/install
  • OAuth callbacks with unexpected projectId values

Network Indicators:

  • Unusual traffic patterns to Slack OAuth endpoints
  • Multiple failed OAuth authorization attempts

SIEM Query:

source="langfuse" AND (url_path="/api/public/slack/install" OR message="Slack OAuth")

🔗 References

📤 Share & Export