AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weakness through browser-driven or local cross-origin requests to abuse the localhost API and enable attack chains against the local control plane.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weakness through browser-driven or local cross-origin requests to abuse the localhost API and enable attack chains against the local control plane. | |
| Title | AgentFlow Local Web API Content-Type Validation Bypass | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T19:30:32.946Z
Reserved: 2026-04-29T15:46:44.053Z
Link: CVE-2026-7439
Updated: 2026-04-29T19:30:15.761Z
Status : Received
Published: 2026-04-29T19:16:26.870
Modified: 2026-04-29T20:16:32.307
Link: CVE-2026-7439
No data.
OpenCVE Enrichment
Updated: 2026-04-29T21:15:16Z