LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-7466 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 29, 2026

AgentFlow - Remote Code Execution

Published: April 29, 2026Updated: April 29, 2026Remote Exploitable

Overview

AgentFlow contains an arbitrary code execution caused by user-controlled pipeline_path parameter in POST /api/runs and /api/runs/validate endpoints, letting attackers execute local Python pipeline files remotely, exploit requires network access.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

Attackers can execute arbitrary code on the server, potentially leading to full system compromise.

Mitigation

Update to the latest version of AgentFlow.

Details

CVE ID
CVE-2026-7466
Severity
High
CVSS Score
8.8
Type
undefined
Status
new

CWE

  • CWE-94

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H