<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Langflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/langflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 10:39:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/langflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>Langflow Multiple Vulnerabilities Allow Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</link><pubDate>Mon, 04 May 2026 10:39:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-langflow-code-exec/</guid><description>An authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.</description><content:encoded><![CDATA[<p>Langflow is vulnerable to multiple security flaws that could allow a remote attacker to execute arbitrary code on the affected system. Successful exploitation of these vulnerabilities requires the attacker to be authenticated. The specific nature of these vulnerabilities is not detailed in the advisory, however the potential impact is severe, allowing for complete system compromise if successfully exploited. Defenders should prioritize identifying and mitigating installations of Langflow that are exposed to untrusted networks or users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker gains initial access to the Langflow application.</li>
<li>The attacker crafts a malicious request targeting one of the unspecified vulnerabilities.</li>
<li>The malicious request is sent to the Langflow server.</li>
<li>The Langflow server processes the request, triggering the vulnerability.</li>
<li>The vulnerability allows the attacker to inject arbitrary code into the Langflow process.</li>
<li>The injected code executes within the context of the Langflow application.</li>
<li>The attacker leverages the initial code execution to escalate privileges.</li>
<li>The attacker achieves arbitrary code execution on the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote, authenticated attacker to execute arbitrary code on the Langflow server. This could lead to a complete compromise of the affected system, including the theft of sensitive data, the installation of malware, and the disruption of services. Given the lack of specific vulnerability details, it is difficult to estimate the precise number of potentially affected installations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Langflow application logs for suspicious activity indicative of unauthorized access or code execution.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Implement strict access controls for the Langflow application to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>code-execution</category><category>web-application</category></item><item><title>Langflow Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-langflow-vulns/</link><pubDate>Mon, 20 Apr 2026 10:38:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-langflow-vulns/</guid><description>Multiple vulnerabilities in Langflow allow an attacker to manipulate files, disclose sensitive information, or conduct cross-site scripting attacks.</description><content:encoded><![CDATA[<p>Langflow is affected by multiple vulnerabilities that could allow attackers to perform malicious actions. While specific details such as CVEs and exploited versions are not provided, the identified vulnerabilities enable attackers to manipulate files, potentially leading to data corruption or unauthorized modifications. The disclosure of sensitive information is another significant risk, potentially exposing credentials or other confidential data. Finally, the possibility of Cross-Site Scripting (XSS) attacks could allow attackers to inject malicious scripts into the Langflow application, affecting user sessions and potentially leading to account compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Langflow instance running a vulnerable version.</li>
<li>Attacker exploits a file manipulation vulnerability to modify application files.</li>
<li>Malicious code injected alters application behavior.</li>
<li>Attacker exploits a separate vulnerability to access sensitive configuration files.</li>
<li>Attacker gains access to credentials or API keys.</li>
<li>Attacker leverages XSS vulnerability to inject malicious JavaScript into a Langflow page.</li>
<li>Victim visits the compromised page, executing the attacker&rsquo;s script.</li>
<li>Attacker steals user session cookies or redirects the victim to a phishing site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in unauthorized file modifications, leading to application malfunction or data corruption. Sensitive information disclosure can lead to compromised credentials, allowing attackers to gain further access to systems and data. Cross-site scripting can lead to user account compromise, data theft, and further propagation of the attack. The number of affected Langflow instances is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious activity related to file access and modification, focusing on unusual file paths or unexpected HTTP methods (see rule: &ldquo;Langflow Suspicious File Access&rdquo;).</li>
<li>Implement strict input validation and output encoding to mitigate the risk of Cross-Site Scripting (XSS) attacks (see rule: &ldquo;Langflow Potential XSS Attempt&rdquo;).</li>
<li>Regularly review and update Langflow installations to the latest versions to patch potential vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>langflow</category><category>vulnerability</category><category>xss</category><category>file-manipulation</category><category>information-disclosure</category></item><item><title>Langflow Unrestricted File Upload Vulnerability (CVE-2026-6596)</title><link>https://feed.craftedsignal.io/briefs/2026-04-langflow-unrestricted-upload/</link><pubDate>Mon, 20 Apr 2026 03:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-langflow-unrestricted-upload/</guid><description>An unrestricted file upload vulnerability in langflow-ai langflow versions up to 1.1.0 allows remote attackers to execute arbitrary code via the create_upload_file function in the API Endpoint.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-6596, has been discovered in langflow-ai langflow, affecting versions up to 1.1.0. The vulnerability resides within the <code>create_upload_file</code> function of the <code>src/backend/base/Langflow/api/v1/endpoints.py</code> file, specifically in the API Endpoint component. This flaw allows for unrestricted file uploads, potentially enabling attackers to upload and execute malicious files on the server. The vulnerability is remotely exploitable and an exploit has been publicly released, increasing the risk of widespread exploitation. The vendor was notified, but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Langflow instance running a vulnerable version (&lt;= 1.1.0).</li>
<li>The attacker sends a crafted HTTP POST request to the <code>create_upload_file</code> API endpoint.</li>
<li>The request includes a malicious file disguised with a permissible extension or without proper validation.</li>
<li>The <code>create_upload_file</code> function fails to adequately validate the uploaded file type or size.</li>
<li>The malicious file is written to the server&rsquo;s file system in an accessible location.</li>
<li>The attacker crafts a second request to execute the uploaded malicious file. This could involve accessing the file directly via a web browser or triggering its execution through other server-side processes.</li>
<li>Successful execution of the file grants the attacker arbitrary code execution on the server.</li>
<li>The attacker leverages code execution to compromise the system, potentially leading to data exfiltration, service disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could allow an attacker to gain complete control over the affected Langflow instance. This could lead to the compromise of sensitive data, disruption of services, and potential further attacks on other systems within the network. Given the ease of exploitation and the availability of a public exploit, organizations using vulnerable versions of Langflow are at significant risk. The impact would depend on the deployment and data handled by the Langflow installation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Langflow to a version higher than 1.1.0 to patch CVE-2026-6596.</li>
<li>Implement the Sigma rule <code>Detect Suspicious File Uploads to Langflow API</code> to detect exploitation attempts targeting the <code>create_upload_file</code> endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>/api/v1/upload</code> endpoint, as this is the likely path for exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-6596</category><category>unrestricted-upload</category><category>langflow</category></item><item><title>IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)</title><link>https://feed.craftedsignal.io/briefs/2026-04-langflow-rce/</link><pubDate>Wed, 08 Apr 2026 01:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-langflow-rce/</guid><description>IBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.</description><content:encoded><![CDATA[<p>IBM Langflow Desktop, a low-code platform designed to build custom LLM applications, is susceptible to a critical vulnerability (CVE-2026-3357) affecting versions 1.6.0 through 1.8.2. The flaw stems from an insecure default setting within the FAISS (Facebook AI Similarity Search) component, which permits the deserialization of untrusted data. This vulnerability allows an authenticated user to execute arbitrary code on the host system. Successful exploitation grants the attacker full control over the Langflow Desktop instance and potentially the underlying system. Due to the ease of exploitation, especially for authenticated users, defenders must prioritize patching or mitigating this issue to prevent potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the vulnerable IBM Langflow Desktop application (versions 1.6.0 through 1.8.2).</li>
<li>The attacker crafts malicious serialized data designed to exploit the insecure deserialization vulnerability in the FAISS component.</li>
<li>The attacker injects the malicious serialized data into the Langflow application, potentially through a manipulated API request or a crafted workflow file.</li>
<li>Langflow Desktop processes the malicious data using the vulnerable FAISS component.</li>
<li>The FAISS component deserializes the untrusted data without proper validation.</li>
<li>During deserialization, the malicious payload is executed, leading to arbitrary code execution within the context of the Langflow Desktop application.</li>
<li>The attacker gains control of the Langflow Desktop application.</li>
<li>The attacker leverages the code execution to escalate privileges, install malware, or exfiltrate sensitive data from the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3357 allows an attacker to execute arbitrary code on the system running IBM Langflow Desktop. This could lead to complete system compromise, including data theft, malware installation, and denial of service. Given the low complexity and the ability to exploit it with authentication, this vulnerability poses a significant risk to organizations using the affected versions of Langflow Desktop. The impact is amplified if the Langflow Desktop instance has access to sensitive data or critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IBM Langflow Desktop to a patched version that addresses CVE-2026-3357. Refer to IBM&rsquo;s security advisory (<a href="https://www.ibm.com/support/pages/node/7268428">https://www.ibm.com/support/pages/node/7268428</a>) for specific upgrade instructions.</li>
<li>Implement input validation and sanitization measures to prevent the deserialization of untrusted data.</li>
<li>Monitor network traffic for suspicious activity related to Langflow Desktop, such as unexpected API calls or data transfers.</li>
<li>Enable logging for Langflow Desktop and related components, and analyze logs for signs of exploitation.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block attempts to exploit deserialization vulnerabilities in web applications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-3357</category><category>deserialization</category><category>rce</category><category>langflow</category></item><item><title>Langflow Vulnerability Allows File Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-file-manipulation/</link><pubDate>Mon, 30 Mar 2026 10:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-file-manipulation/</guid><description>An authenticated, remote attacker can exploit a vulnerability in Langflow to manipulate files, potentially leading to unauthorized data modification or application compromise.</description><content:encoded><![CDATA[<p>A vulnerability exists in Langflow that allows a remote, authenticated attacker to manipulate files. Langflow is a UI for rapidly prototyping flows. The specific nature of the vulnerability is not detailed in the source document, but the impact is that an attacker with valid credentials can modify files accessible to the Langflow application. This could potentially lead to code injection, data corruption, or unauthorized access to sensitive information within the application&rsquo;s scope. Defenders should focus on detecting unusual file modifications originating from the Langflow application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials to the Langflow application through password compromise, credential stuffing, or other means.</li>
<li>The attacker authenticates to the Langflow application via the web interface or API.</li>
<li>The attacker leverages the Langflow vulnerability (specific details unknown) to access and modify files within the Langflow application&rsquo;s file system.</li>
<li>The attacker modifies application configuration files to inject malicious code or alter application behavior.</li>
<li>The attacker uploads malicious files to the server.</li>
<li>The attacker triggers the execution of the injected code or uploaded files.</li>
<li>The attacker gains unauthorized access to sensitive data or elevates privileges within the application.</li>
<li>The attacker maintains persistence through backdoors or other methods within the compromised Langflow environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to significant damage. Attackers could modify critical application files, leading to data corruption, denial of service, or complete system compromise. The lack of specific details on the vulnerability makes it difficult to assess the total number of potential victims. The severity depends on the scope of Langflow&rsquo;s file access and the sensitivity of the data it manages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file modifications within the Langflow application&rsquo;s file system for suspicious activity (e.g., unexpected changes to configuration files, creation of new executable files) using <code>file_event</code> log sources.</li>
<li>Implement the provided Sigma rules to detect potential exploitation attempts targeting Langflow&rsquo;s file system.</li>
<li>Investigate and remediate any unauthorized access or modifications to files associated with the Langflow application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>langflow</category><category>file-manipulation</category><category>vulnerability</category></item><item><title>Langflow IDOR Vulnerability Allows Cross-User Flow Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-idor/</link><pubDate>Fri, 27 Mar 2026 19:36:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-idor/</guid><description>Langflow versions 1.5.0 and earlier contain an IDOR vulnerability (CVE-2026-34046) that allows authenticated users to read, modify, and delete flows belonging to other users due to a missing ownership check, potentially exposing sensitive information and enabling unauthorized control over AI agent logic.</description><content:encoded><![CDATA[<p>Langflow, a platform for building AI agents, suffered from an Insecure Direct Object Reference (IDOR) vulnerability affecting versions 1.5.0 and earlier. This flaw, identified as CVE-2026-34046, resided in the <code>_read_flow</code> helper function within the <code>src/backend/base/langflow/api/v1/flows.py</code> file. The vulnerability arose from a conditional check related to the <code>AUTO_LOGIN</code> setting, which inadvertently bypassed ownership validation when authentication was enabled. As a result, any authenticated…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>langflow</category><category>vulnerability</category></item><item><title>Langflow Vulnerability Allows Arbitrary Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-code-exec/</link><pubDate>Wed, 25 Mar 2026 11:21:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-code-exec/</guid><description>A vulnerability in Langflow allows an attacker to execute arbitrary code, potentially leading to system compromise.</description><content:encoded><![CDATA[<p>A critical vulnerability exists within Langflow that allows a remote attacker to execute arbitrary code. The specific nature of the vulnerability is not detailed in the source advisory, but the impact is significant. The lack of specific information regarding exploitation limits detailed analysis, but defenders should assume the vulnerability is easily exploitable. Successful exploitation could allow an attacker to gain complete control over the affected system, leading to data theft, system corruption, or use as a staging point for further attacks. Given the severity, immediate action is required.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Langflow instance. The method of identification is currently unknown, but may involve banner grabbing or vulnerability scanning.</li>
<li>The attacker crafts a malicious request designed to exploit the Langflow vulnerability. The specifics of this request depend on the exact vulnerability.</li>
<li>The attacker sends the malicious request to the Langflow instance.</li>
<li>Langflow processes the request, triggering the vulnerability.</li>
<li>The attacker&rsquo;s code is executed on the server, potentially with the privileges of the Langflow application.</li>
<li>The attacker establishes a persistent foothold on the system, potentially installing a backdoor or creating new user accounts.</li>
<li>The attacker performs lateral movement to access other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete system compromise. The attacker gains the ability to execute arbitrary code, potentially leading to data theft, system corruption, or installation of malware. The number of affected systems is currently unknown. The impact is considered critical due to the potential for widespread damage and disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious activity targeting Langflow instances to detect initial exploitation attempts (see rule: &ldquo;Detect Langflow Code Execution Attempts via Web Logs&rdquo;).</li>
<li>Implement strict input validation and sanitization measures within Langflow to prevent code injection attacks.</li>
<li>Review and audit Langflow&rsquo;s code for potential vulnerabilities, paying close attention to areas that handle user input or external data.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>code-execution</category><category>vulnerability</category></item><item><title>Multiple Vulnerabilities in Langflow Allow for Arbitrary Code Execution and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-vulns/</link><pubDate>Wed, 25 Mar 2026 09:46:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-vulns/</guid><description>Multiple vulnerabilities in Langflow could be exploited by an attacker to execute arbitrary program code, disclose information, and potentially manipulate data, leading to potential system compromise.</description><content:encoded><![CDATA[<p>Langflow is vulnerable to multiple security flaws that could allow a remote attacker to perform several malicious actions. These vulnerabilities, if successfully exploited, may lead to arbitrary code execution, sensitive information disclosure, and data manipulation. While the specific versions affected and CVEs are not detailed in the advisory, the potential impact is significant, suggesting a need for immediate investigation and mitigation strategies for organizations utilizing Langflow in their environments. Defenders should prioritize identifying instances of Langflow within their infrastructure and monitor for any unusual activity related to the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Langflow instance.</li>
<li>Attacker exploits a vulnerability to inject malicious code. (T1203)</li>
<li>The injected code executes within the context of the Langflow application. (T1059)</li>
<li>The attacker leverages code execution to access sensitive information, such as credentials or API keys, stored within the application or on the underlying system. (T1003)</li>
<li>Attacker escalates privileges by exploiting a separate vulnerability or misconfiguration. (T1068)</li>
<li>With elevated privileges, the attacker gains broader access to the system and network. (T1078)</li>
<li>Attacker exfiltrates sensitive data to an external server. (T1041)</li>
<li>Attacker manipulates data within the Langflow application or connected systems, potentially causing data corruption or further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these Langflow vulnerabilities could lead to complete system compromise, including arbitrary code execution and the theft of sensitive data. Depending on the function of the Langflow instance, impacts could range from data breaches and financial loss to disruption of critical services. Given the potential for lateral movement and privilege escalation, the scope of the impact could extend beyond the immediate Langflow environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate all Langflow installations within the environment and apply any available patches or updates provided by the vendor.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Langflow instance.</li>
<li>Monitor Langflow application logs for suspicious activity such as unusual API calls or unauthorized access attempts. Use the process creation rule to detect execution of suspicious processes spawned by Langflow.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts.</li>
<li>Review and enforce principle of least privilege for accounts used by Langflow.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>vulnerability</category><category>code-execution</category><category>information-disclosure</category></item><item><title>Critical RCE Vulnerability in Langflow AI Pipelines (CVE-2026-33017)</title><link>https://feed.craftedsignal.io/briefs/2026-03-langflow-rce/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-langflow-rce/</guid><description>A critical remote code execution vulnerability, CVE-2026-33017, exists in Langflow AI pipelines prior to version 1.9.0 that allows an unauthenticated remote attacker to execute code with full server process privileges, impacting availability, integrity, and confidentiality.</description><content:encoded>&lt;p>A critical remote code execution vulnerability, CVE-2026-33017, affects Langflow AI pipelines prior to version 1.9.0. Langflow is a tool used for building and deploying AI-powered agents and workflows. The vulnerability resides in the &lt;code>build_public_tmp&lt;/code> endpoint, which is intended to be unauthenticated for public flows. However, it incorrectly accepts attacker-supplied flow data, leading to remote code execution with full server process privileges. The vulnerability can be exploited by an…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>langflow</category><category>rce</category><category>cve-2026-33017</category><category>ai-pipeline</category></item></channel></rss>