Remote Code Execution Vulnerability in Langflow AI Tool
CVE-2026-27966
What is CVE-2026-27966?
CVE-2026-27966 is a critical remote code execution vulnerability found in the Langflow AI tool, which is designed for creating and managing AI-driven agents and workflows. The vulnerability arises from a security oversight in versions prior to 1.8.0, where the CSV Agent node has allow_dangerous_code=True hardcoded. This configuration exposes LangChain's Python REPL, allowing attackers to execute arbitrary Python code and operating system commands through a prompt injection attack. As a result, organizations using affected versions of Langflow may face significant risks, including unauthorized access and control over their server environments, leading to compromise or data loss.
Potential impact of CVE-2026-27966
-
Remote Code Execution: The primary risk associated with this vulnerability is the ability for an attacker to execute arbitrary code on the server. This unchecked access could allow malicious actors to manipulate data, steal sensitive information, or deploy further malware within the environment.
-
Full System Compromise: Since the vulnerability permits the execution of OS commands, the consequences extend beyond mere data manipulation. An attacker could achieve full control over the affected server, disrupting business operations and potentially affecting other interconnected systems.
-
Increased Attack Surface: The exposure of Langflow's Python REPL means that any vulnerable instance serves as a potential launching point for attacks against internal systems and databases. This could lead to broader security incidents, particularly if organizations do not have robust security measures and monitoring in place to detect and respond to such threats.
Affected Version(s)
langflow < 1.8.0
