Warning: New critical vulnerability in Langflow. Patch Immediately!

Image
Decorative image
Veröffentlicht : 25/03/2026
  • Last update: 25/03/2026
  • Affected software: Langflow prior to version 1.9.0
  • Type: remote shell injection
  • CVE/CVSS: CVE-2026-33475: 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)

Sources

https://nvd.nist.gov/vuln/detail/CVE-2026-33475

Risks

Langflow is a tool for building and deploying AI-powered agents and workflows.

Langflow versions prior to 1.9.0 are affected by CVE-2026-33475, an unauthenticated shell injection vulnerability in GitHub Actions workflows. An attacker can exploit this vulnerability by crafting a malicious branch or pull request, potentially leading to the exposure of sensitive information (e.g. GITHUB_TOKEN), infrastructure manipulation, and broader supply chain compromise during CI/CD processes.

A publicly available proof of concept (PoC) exists for this vulnerability, which significantly increases the risk of exploitation by lowering the barrier for attackers to reproduce and weaponize the issue.

Description

CVE-2026-33475 is a critical vulnerability (CVSS 9.1) that stems from the use of unsensitised GitHub context variables, such as branch names or pull request titles, directly within shell commands, enabling attackers to execute arbitrary commands.

The vulnerability requires no authentication and can be exploited by any user who can create a pull request in a public fork with GitHub Actions enabled. The attack chain involves creating a branch with injected shell commands, opening a pull request, and the CI workflow automatically executing the malicious payload.

Recommended Actions

Patch

The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.

Monitor/Detect

The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident.

References

https://nvd.nist.gov/vuln/detail/CVE-2026-33475