Authentication Bypass in Langflow Tool for AI-Powered Workflows
CVE-2026-33017

9.3CRITICAL

Key Information:

Status
Vendor
CVE Published:
20 March 2026

Badges

📈 Score: 637👾 Exploit Exists🟡 Public PoC

What is CVE-2026-33017?

CVE-2026-33017 refers to a critical authentication bypass vulnerability found in the Langflow Tool, specifically within its AI-powered workflow capabilities. Langflow is designed to help users build and deploy AI-driven agents and workflows, enabling organizations to streamline various automated tasks and processes. However, in versions preceding 1.9.0, a significant flaw exists in the endpoint that handles public flow creations, which does not require user authentication. This allows unauthorized individuals to create public flows by injecting malicious code through a manipulated data parameter. The absence of sandboxing means that this attacker-controlled code can be executed directly, leading to significant security risks, including remote code execution (RCE). Thus, organizations leveraging Langflow could face severe implications if they remain on affected versions, as adversaries can exploit this weakness to gain unauthorized access and control over systems.

Potential impact of CVE-2026-33017

  1. Unauthorized Remote Code Execution: The core risk of CVE-2026-33017 is the potential for unauthorized remote code execution. Attackers can leverage this vulnerability to run arbitrary code on the server, leading to complete control over affected systems and the possible extraction of sensitive data or deployment of additional malicious software.

  2. Data Breaches: Exploiting this vulnerability can facilitate data breaches, as attackers may gain access to confidential information stored on the affected systems. This can result in financial losses, legal repercussions, and damage to an organization’s reputation, especially if customer data is compromised.

  3. Compromise of Internal Systems: The exploitation of CVE-2026-33017 can allow threat actors to not only access the Langflow platform but possibly pivot to compromise other internal systems connected to it. This lateral movement can enable a broader scope of attack, significantly amplifying the impact on an organization’s IT infrastructure.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

langflow < 1.9.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.