CVE-2026-33475 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: March 24, 2026
Langflow - Command Injection
Published: March 24, 2026Updated: March 24, 2026Remote Exploitable
Overview
Langflow < 1.9.0 contains a command injection vulnerability caused by unsanitized interpolation of GitHub context variables in GitHub Actions workflows, letting unauthenticated attackers execute arbitrary shell commands remotely via malicious branch names or pull request titles.
Severity & Score
Severity: Critical
CVSS Score: 9.1
Impact
Attackers can execute arbitrary commands in CI, exfiltrate secrets, manipulate infrastructure, and compromise the supply chain.
Mitigation
Update to Langflow version 1.9.0 or later which patches the vulnerability by sanitizing inputs and using environment variables.
Related Resources
Details
- CVE ID
- CVE-2026-33475
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- command_injection
- Status
- unconfirmed
CWE
- CWE-74
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N