CVE-2026-7466 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: April 29, 2026
AgentFlow - Remote Code Execution
Published: April 29, 2026Updated: April 29, 2026Remote Exploitable
Overview
AgentFlow contains an arbitrary code execution caused by user-controlled pipeline_path parameter in POST /api/runs and /api/runs/validate endpoints, letting attackers execute local Python pipeline files remotely, exploit requires network access.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Attackers can execute arbitrary code on the server, potentially leading to full system compromise.
Mitigation
Update to the latest version of AgentFlow.
References
Related Resources
Details
- CVE ID
- CVE-2026-7466
- Severity
- High
- CVSS Score
- 8.8
- Type
- undefined
- Status
- new
CWE
- CWE-94
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H