Remote Code Execution Vulnerability in Langflow AI Tool
CVE-2026-27966
What is CVE-2026-27966?
Langflow, a tool designed for creating and managing AI-powered agents and workflows, has a significant vulnerability prior to version 1.8.0. The CSV Agent node within the application is configured with allow_dangerous_code=True, enabling execution of dangerous commands. This misconfiguration can be exploited through prompt injection, granting attackers the ability to execute arbitrary Python and operating system commands on the server. Subsequently, this leads to full Remote Code Execution (RCE), posing a severe risk to the security and integrity of affected systems. Users are urged to upgrade to version 1.8.0 or later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
langflow < 1.8.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
