TROYANOSYVIRUS
Retour aux CVEs

CVE-2026-33017

CRITICALCISA KEV
9.8

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/20/2026
Derniere modification3/26/2026
Sourcenvd
Observations honeypot0

CISA KEV

FournisseurLangflow
ProduitLangflow
Nom vulnerabiliteLangflow Code Injection Vulnerability
Date ajout KEV2026-03-25
Date limite remediation2026-04-08
Utilise dans ransomwareUnknown

Produits affectes

langflow:langflow

Faiblesses (CWE)

CWE-94CWE-95CWE-306

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.