Langflow Vulnerabilities Allow Code Execution and Security Bypass
Summary
CERT-Bund has issued a security advisory (WID-SEC-2026-0747) regarding critical vulnerabilities in Langflow versions <=1.8.1 and <1.7.2. These flaws allow remote code execution and security bypass, with a CVSS base score of 10.0. Mitigation is available.
What changed
CERT-Bund has released a critical security advisory (WID-SEC-2026-0747) detailing multiple vulnerabilities in Langflow, an open-source tool for building LLM-based applications. The vulnerabilities, affecting versions <=1.8.1 and <1.7.2, have a CVSS base score of 10.0 and allow attackers to bypass security measures or execute arbitrary code remotely. Mitigation measures are available.
Organizations using affected versions of Langflow should immediately update to a patched version or implement available mitigation strategies to prevent unauthorized code execution and security breaches. Failure to address these critical vulnerabilities could lead to significant security compromises, including data breaches and system takeover. The advisory highlights the urgent need for security patching and review of deployed LLM application development tools.
What to do next
- Update Langflow to a version greater than 1.8.1 or 1.7.2.
- Implement available mitigation strategies if immediate update is not possible.
- Review security configurations for all LLM applications built with Langflow.
Source document (simplified)
[WID-SEC-2026-0747] Langflow: Mehrere Schwachstellen CVSS Base Score 10.0 (kritisch) CVSS Temporal Score 9.2 (kritisch) Remoteangriff ja Datum 16.03.2026 Stand 17.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Langflow bietet eine visuelle Schnittstelle zum Erstellen von LLM-basierten Anwendungen.
Produkte
16.03.2026
- Open Source Langflow <=1.8.1
- Open Source Langflow <1.7.2
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Langflow ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder beliebigen Code auszuführen, was weitere Angriffe ermöglicht. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.