CVE-2026-33017

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

History

26 Mar 2026, 13:26

Type Values Removed Values Added
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33017 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33017 - US Government Resource

25 Mar 2026, 23:17

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33017 -
References () https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx - Exploit, Vendor Advisory, Mitigation () https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx - Exploit, Mitigation, Vendor Advisory

25 Mar 2026, 19:37

Type Values Removed Values Added
CPE cpe:2.3:a:langflow:langflow:1.9.0:dev4:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev2:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev11:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev7:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev8:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev9:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev5:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev10:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev1:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev6:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev0:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev3:*:*:*:*:*:*
References () https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx - Exploit, Vendor Advisory () https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx - Exploit, Vendor Advisory, Mitigation
References () https://github.com/langflow-ai/langflow/releases/tag/1.8.2 - () https://github.com/langflow-ai/langflow/releases/tag/1.8.2 - Release Notes
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33017 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33017 - US Government Resource

25 Mar 2026, 19:16

Type Values Removed Values Added
References
  • () https://github.com/langflow-ai/langflow/releases/tag/1.8.2 -

25 Mar 2026, 18:16

Type Values Removed Values Added
References
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33017 -

24 Mar 2026, 21:20

Type Values Removed Values Added
References () https://github.com/advisories/GHSA-rvqx-wpfh-mfx7 - () https://github.com/advisories/GHSA-rvqx-wpfh-mfx7 - Third Party Advisory
References () https://github.com/langflow-ai/langflow/commit/73b6612e3ef25fdae0a752d75b0fabd47328d4f0 - () https://github.com/langflow-ai/langflow/commit/73b6612e3ef25fdae0a752d75b0fabd47328d4f0 - Patch
References () https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx - () https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx - Exploit, Vendor Advisory
References () https://medium.com/@aviral23/cve-2026-33017-how-i-found-an-unauthenticated-rce-in-langflow-by-reading-the-code-they-already-dc96cdce5896 - () https://medium.com/@aviral23/cve-2026-33017-how-i-found-an-unauthenticated-rce-in-langflow-by-reading-the-code-they-already-dc96cdce5896 - Exploit, Third Party Advisory
References () https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours - () https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours - Press/Media Coverage
CPE cpe:2.3:a:langflow:langflow:1.9.0:dev4:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev2:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev11:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev7:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev8:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev9:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev5:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev10:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev1:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev6:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev0:*:*:*:*:*:*
cpe:2.3:a:langflow:langflow:1.9.0:dev3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Langflow langflow
Langflow

23 Mar 2026, 16:16

Type Values Removed Values Added
References
  • () https://medium.com/@aviral23/cve-2026-33017-how-i-found-an-unauthenticated-rce-in-langflow-by-reading-the-code-they-already-dc96cdce5896 -

20 Mar 2026, 19:16

Type Values Removed Values Added
References
  • () https://www.sysdig.com/blog/cve-2026-33017-how-attackers-compromised-langflow-ai-pipelines-in-20-hours -
Summary
  • (es) Langflow es una herramienta para construir y desplegar agentes y flujos de trabajo impulsados por IA. En versiones anteriores a la 1.9.0, el endpoint POST /api/v1/build_public_tmp/{flow_id}/flow permite construir flujos públicos sin requerir autenticación. Cuando se suministra el parámetro opcional data, el endpoint utiliza datos de flujo controlados por el atacante (que contienen código Python arbitrario en las definiciones de nodos) en lugar de los datos de flujo almacenados en la base de datos. Este código se pasa a exec() sin ningún sandboxing, lo que resulta en una ejecución remota de código no autenticada. Esto es distinto de CVE-2025-3248, que corrigió /api/v1/validate/code añadiendo autenticación. El endpoint build_public_tmp está diseñado para no requerir autenticación (para flujos públicos) pero acepta incorrectamente datos de flujo suministrados por el atacante que contienen código ejecutable arbitrario. Este problema ha sido solucionado en la versión 1.9.0.

20 Mar 2026, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-20 05:16

Updated : 2026-03-26 13:26


NVD link : CVE-2026-33017

Mitre link : CVE-2026-33017

CVE.ORG link : CVE-2026-33017


JSON object : View

Products Affected

langflow

  • langflow
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-306

Missing Authentication for Critical Function