
""The POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication, resulting in unauthenticated remote code execution.""
""When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data instead of the stored flow data from the database, leading to severe security risks.""
""CVE-2026-33017 is in /api/v1/build_public_tmp/{flow_id}/flow, stemming from the same exec() call as CVE-2025-3248, highlighting a critical design flaw.""
""The real fix is removing the data parameter from the public endpoint entirely, ensuring that public flows can only execute their stored data securely.""
A critical security flaw, CVE-2026-33017, in Langflow enables unauthenticated remote code execution through a vulnerable API endpoint. The flaw, with a CVSS score of 9.3, involves missing authentication and code injection. It affects all versions up to 1.8.1 and has been exploited shortly after its disclosure. The vulnerability allows attackers to execute arbitrary Python code by manipulating flow data. A proposed fix involves removing the data parameter from the public endpoint to maintain security while preserving functionality.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]