AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weakness through browser-driven or local cross-origin requests to abuse the localhost API and enable attack chains against the local control plane.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Berabuddies
Berabuddies agentflow |
|
| Vendors & Products |
Berabuddies
Berabuddies agentflow |
Wed, 29 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weakness through browser-driven or local cross-origin requests to abuse the localhost API and enable attack chains against the local control plane. | |
| Title | AgentFlow Local Web API Content-Type Validation Bypass | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T19:30:32.946Z
Reserved: 2026-04-29T15:46:44.053Z
Link: CVE-2026-7439
Updated: 2026-04-29T19:30:15.761Z
Status : Deferred
Published: 2026-04-29T19:16:26.870
Modified: 2026-04-30T15:44:48.290
Link: CVE-2026-7439
No data.