Arbitrary Code Execution in AgentFlow - Berabuddies
CVE-2026-7466

7.7HIGH

Key Information:

Status
Vendor
CVE Published:
29 April 2026

What is CVE-2026-7466?

AgentFlow contains a vulnerability that enables arbitrary code execution through user-supplied parameters. Specifically, by manipulating the 'pipeline_path' parameter in POST requests to the /api/runs and /api/runs/validate endpoints, an attacker can prompt the local AgentFlow API to run existing Python pipeline files stored on the disk. This exploitation can lead to executions in the context of the user operating AgentFlow, thus raising serious security concerns regarding unauthorized code execution.

Affected Version(s)

AgentFlow 0 < 1667fa3

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Chia Min Jun Lennon
.