Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically exposes LangChain’s Python REPL tool (`python_repl_ast`). As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection, leading to full Remote Code Execution (RCE). Version 1.8.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/langflow-ai/langflow/commit/d8c6480daa17b2f2af0b5470cdf5c3d28dc9e508 | Patch |
| https://github.com/langflow-ai/langflow/security/advisories/GHSA-3645-fxcv-hqr4 | Exploit Vendor Advisory |
Configurations
History
28 Feb 2026, 00:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/langflow-ai/langflow/commit/d8c6480daa17b2f2af0b5470cdf5c3d28dc9e508 - Patch | |
| References | () https://github.com/langflow-ai/langflow/security/advisories/GHSA-3645-fxcv-hqr4 - Exploit, Vendor Advisory | |
| First Time |
Langflow langflow
Langflow |
|
| CPE | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* |
27 Feb 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/langflow-ai/langflow/security/advisories/GHSA-3645-fxcv-hqr4 - |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Feb 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/langflow-ai/langflow/security/advisories/GHSA-3645-fxcv-hqr4 - |
26 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 02:16
Updated : 2026-02-28 00:54
NVD link : CVE-2026-27966
Mitre link : CVE-2026-27966
CVE.ORG link : CVE-2026-27966
JSON object : View
Products Affected
langflow
- langflow
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
