CVE-2024-48061

langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

History

28 May 2025, 20:56

Type Values Removed Values Added
References () https://gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61 - () https://gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61 - Third Party Advisory
References () https://rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8 - () https://rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8 - Exploit, Third Party Advisory
CPE cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
First Time Langflow
Langflow langflow

06 Nov 2024, 20:35

Type Values Removed Values Added
CWE CWE-94
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

05 Nov 2024, 16:04

Type Values Removed Values Added
Summary
  • (es) langflow &lt;=1.0.18 es vulnerable a la ejecución remota de código (RCE), ya que cualquier componente proporciona la funcionalidad del código y los componentes se ejecutan en la máquina local en lugar de en un entorno aislado.

04 Nov 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-04 23:15

Updated : 2025-05-28 20:56


NVD link : CVE-2024-48061

Mitre link : CVE-2024-48061

CVE.ORG link : CVE-2024-48061


JSON object : View

Products Affected

langflow

  • langflow
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')