Changeflow GovPing Data Privacy & Cybersecurity Langflow Vulnerability Allows Code Execution
Priority review Notice Amended Final

Langflow Vulnerability Allows Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund has issued a security advisory for Langflow, a tool for creating LLM-based applications. A vulnerability (CVSS 8.8) allows remote attackers to execute arbitrary code on affected systems running versions prior to 1.9.0. Mitigation measures are available.

Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0841) detailing a critical vulnerability in Langflow, a visual interface for building LLM-based applications. The vulnerability, rated with a CVSS Base Score of 8.8, allows remote attackers to execute arbitrary code on affected systems. The advisory applies to Linux, UNIX, and Windows operating systems and specifically impacts open-source Langflow versions prior to 1.9.0.

Organizations utilizing Langflow should immediately review their deployed versions and apply available mitigation measures. Failure to address this vulnerability could lead to unauthorized code execution, potentially compromising system integrity and data security. Users are advised to consult the advisory for specific mitigation steps and version upgrade recommendations.

What to do next

  1. Review Langflow version for deployment.
  2. Apply available mitigation measures for versions < 1.9.0.
  3. Consider upgrading Langflow to a patched version.

Archived snapshot

Mar 25, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0841] Langflow: Schwachstelle ermöglicht Codeausführung CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.9 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Langflow bietet eine visuelle Schnittstelle zum Erstellen von LLM-basierten Anwendungen.

Produkte

24.03.2026
- Open Source Langflow <1.9.0

Angriff

Angriff

Ein Angreifer kann eine Schwachstelle in Langflow ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
March 24th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0841

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Software Development Application Security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software Vulnerabilities Code Execution

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!