<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33017 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33017/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33017/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical RCE Vulnerability in Langflow AI Pipelines (CVE-2026-33017)</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-rce/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-rce/</guid><description>A critical remote code execution vulnerability, CVE-2026-33017, exists in Langflow AI pipelines prior to version 1.9.0 that allows an unauthenticated remote attacker to execute code with full server process privileges, impacting availability, integrity, and confidentiality.</description><content:encoded>&lt;p>A critical remote code execution vulnerability, CVE-2026-33017, affects Langflow AI pipelines prior to version 1.9.0. Langflow is a tool used for building and deploying AI-powered agents and workflows. The vulnerability resides in the &lt;code>build_public_tmp&lt;/code> endpoint, which is intended to be unauthenticated for public flows. However, it incorrectly accepts attacker-supplied flow data, leading to remote code execution with full server process privileges. The vulnerability can be exploited by an…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>rce</category><category>cve-2026-33017</category><category>ai-pipeline</category></item></channel></rss>