langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox.
References
Link | Resource |
---|---|
https://gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61 | Third Party Advisory |
https://rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8 | Exploit Third Party Advisory |
Configurations
History
28 May 2025, 20:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61 - Third Party Advisory | |
References | () https://rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* | |
First Time |
Langflow
Langflow langflow |
06 Nov 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
05 Nov 2024, 16:04
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Nov 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-04 23:15
Updated : 2025-05-28 20:56
NVD link : CVE-2024-48061
Mitre link : CVE-2024-48061
CVE.ORG link : CVE-2024-48061
JSON object : View
Products Affected
langflow
- langflow
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')