U.S. CISA adds a Langflow flaw to its Known Exploited Vulnerabilities catalog

2 Min Read

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Langflow to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Langflow flaw, tracked as CVE-2026-33017 (CVSS score of 9.3), to its Known Exploited Vulnerabilities (KEV) catalog.

Langflow is a popular tool used for building agentic AI workflows. 

CVE-2026-33017 is a critical flaw in Langflow (before v1.9.0) that allows attackers to execute arbitrary code without authentication. The public build endpoint accepts user-supplied data containing Python code, which is executed via exec() without sandboxing. This can lead to full system compromise.


What do you think? Post a comment.


“The POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution.” reads the advisory. “This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code.”

- Advertisement -

EXPLORE MORE

The Blockade Breaker: Why Trump Blinked as a Russian Oil Tanker Reached Havana

March 30, 2026 — In a move that has stunned geopolitical analysts,…

Revenge of the Neanderthal by Willis A. Carto

The article "Revenge of the Neanderthal," authored by Willis A. Carto and…

Was Kojima the saviour of PlayStation’s State of Play?

This week on the Eurogamer Newscast, we discuss yesterday's PlayStation State of…

The ‘Donbas Deal’: Is Russia Ready to Stop the War for One Specific Region?

The war in Ukraine has been going on for years, but today,…

Direct Hit: Smoke Rises Over Eilat After Iranian Missile Penetrates Air Defenses

Rising behind the residential high-rises and the city's iconic maritime monuments, this…

Satellite Reveal: Precision Strikes Gut Shokuhiye Industrial Zone

New low-resolution satellite imagery has exposed the aftermath of a sustained air…

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerability by April 8, 2026.

In May 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added another Langflow flaw, tracked as CVE-2025-3248 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog.

CVE-2025-3248 is a code injection vulnerability in the /api/v1/validate/code endpoint. A remote, unauthenticated attacker can exploit it by sending crafted HTTP requests to execute arbitrary code. The flaw impacts versions prior to 1.3.0.

Researchers from cybersecurity firm Horizon3.ai discovered the vulnerability and pointed out that it is easily exploitable.

Pierluigi Paganini



Share This Article

CONVERSATION

Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments