LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-33017

CVE-2026-33017 - Vulnerability Analysis

N/a

Last Updated: March 20, 2026

Langflow - Remote Code Execution

Published: March 20, 2026Updated: March 20, 2026KEVPoC Available

Overview

Langflow < 1.9.0 contains an unauthenticated remote code execution caused by use of attacker-controlled flow data passed to exec() without sandboxing in /api/v1/build_public_tmp/{flow_id}/flow endpoint, letting remote attackers execute arbitrary Python code, exploit requires no authentication.

Severity & Score

Severity: N/a
EPSS Score: 565.4%(Probability of exploitation in next 30 days)

Impact

Remote attackers can execute arbitrary Python code without authentication, leading to full system compromise.

Mitigation

Update to version 1.9.0 or later.

Social Media Activity(1 post)

benzogaga33 :verified:
benzogaga33 :verified:
@benzogaga33
Mar 31, 2026

Langflow – À peine dévoilée, déjà exploitée : attention à cette faille critique https://www.it-connect.fr/langflow-cve-2026-33017-cyberattaques-mars-2026/ #ActuCybersécurité #Cybersécurité

View original post

Details

CVE ID
CVE-2026-33017
Severity
N/a
Type
remote_code_execution
Status
unconfirmed
EPSS
565.4%
Social Posts
1

CWE

  • CWE-94

CVSS Metrics

N/A

EPSS Score

565.4%Probability of exploitation in the next 30 days