PT-2026-22107 · Langflow+1 · Langflow+1

Weblover12

·

Published

2026-02-26

·

Updated

2026-04-24

·

CVE-2026-27966

CVSS v3.1

9.8

Critical

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Langflow versions prior to 1.8.0
Description Langflow is a tool for building and deploying AI-powered agents and workflows. In the CSV Agent node, the variable allow dangerous code is hardcoded to True, which automatically exposes LangChain's Python REPL tool (python repl ast). This allows an attacker to execute arbitrary Python and operating system commands on the server through prompt injection, leading to full Remote Code Execution (RCE). Additionally, some reports indicate a deserialization flaw in the flow import endpoint where malicious YAML payloads can be used to execute arbitrary code without authentication. Over 3,000 instances have been identified globally.
Recommendations Update to version 1.8.0. Restrict or disable the CSV Agent node in untrusted deployments.

Exploit

Fix

RCE

Code Injection

Weakness Enumeration

Related Identifiers

CVE-2026-27966
GHSA-3645-FXCV-HQR4

Affected Products

Langchain
Langflow