HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Active Exploitation of Langflow Code Injection (CVE‑2026‑33017) Added to CISA KEV Catalog

CISA has added CVE‑2026‑33017, a code‑injection vulnerability in the Langflow platform, to its Known Exploited Vulnerabilities catalog after confirming active exploitation. The flaw can lead to remote code execution and poses a supply‑chain risk for organizations that embed Langflow in AI/ML workflows. Prompt remediation is required under BOD 22‑01.

🛡️ LiveThreat™ Intelligence · 📅 March 26, 2026· 📰 cisa.gov
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
cisa.gov

Active Exploitation of Langflow Code Injection (CVE‑2026‑33017) Added to CISA KEV Catalog

What It Is – A code‑injection flaw in the open‑source Langflow platform (CVE‑2026‑33017) allows an attacker to inject arbitrary commands into the backend execution engine, potentially achieving remote code execution.

Exploitability – CISA has confirmed active exploitation in the wild and added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. A proof‑of‑concept exists; CVSS v3.1 is currently rated 8.6 (High).

Affected Products – Langflow (any version prior to the vendor‑released patch). The vulnerability impacts deployments that expose the Langflow web UI or API to untrusted input.

TPRM Impact – Organizations that embed Langflow in internal tools, SaaS offerings, or as part of a larger AI/ML pipeline face supply‑chain risk: a compromised Langflow instance can be leveraged to pivot into downstream services, exfiltrate data, or disrupt business processes.

Recommended Actions

  • Inventory all Langflow instances across the enterprise and third‑party services.
  • Apply the vendor‑released patch immediately; if unavailable, block external access to the Langflow UI/API.
  • Align remediation with CISA BOD 22‑01 deadlines (remediate by the prescribed due date).
  • Conduct post‑remediation testing to verify the injection vector is mitigated.
  • Update vulnerability‑management playbooks to prioritize KEV catalog items.

Source: CISA Advisory – CVE‑2026‑33017

📰 Original Source
https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.