Changeflow GovPing Data Privacy & Cybersecurity Langflow Vulnerabilities Advisory
Urgent Notice Amended Final

Langflow Vulnerabilities Advisory

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 22nd, 2026
Detected March 23rd, 2026
Email

Summary

CERT-Bund has issued a security advisory for Langflow, detailing multiple critical vulnerabilities (CVSS Base Score 9.1) that could allow remote code execution, information disclosure, and data manipulation. The advisory affects open-source Langflow versions prior to 1.7.0 and 1.9.0, impacting Linux, UNIX, and Windows operating systems.

What changed

CERT-Bund has released a critical security advisory (WID-SEC-2026-0823) concerning multiple vulnerabilities in Langflow, a visual interface for creating LLM-based applications. The vulnerabilities have a CVSS Base Score of 9.1 and a Temporal Score of 8.2, indicating a high risk. Exploitation could allow an attacker to execute arbitrary code, leading to information disclosure and potential data manipulation. The advisory specifically impacts Open Source Langflow versions prior to 1.7.0 and 1.9.0, running on Linux, UNIX, and Windows operating systems.

Affected organizations using Langflow must immediately review their versions and apply available mitigations. The advisory indicates that mitigation is possible, and users should consult the provided links for specific version history and detailed information on addressing these security flaws. Failure to mitigate these critical vulnerabilities could lead to significant security breaches, including unauthorized access and control over systems processing sensitive data.

What to do next

  1. Review Langflow version and apply available mitigations
  2. Consult advisory for specific version history and remediation steps

Source document (simplified)

[WID-SEC-2026-0823] Langflow: Mehrere Schwachstellen CVSS Base Score 9.1 (kritisch) CVSS Temporal Score 8.2 (hoch) Remoteangriff ja Datum 22.03.2026 Stand 23.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Langflow bietet eine visuelle Schnittstelle zum Erstellen von LLM-basierten Anwendungen.

Produkte

22.03.2026
- Open Source Langflow <1.7.0

  • Open Source Langflow <1.9.0

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Langflow ausnutzen, um beliebigen Programmcode auszuführen, um Informationen offenzulegen, und potenziell um Daten zu manipulieren. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 22nd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0823

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Software Development AI Application Deployment
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Software Vulnerabilities AI Applications

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.