Particle.news
Download on the App Store

Attackers Exploit Critical Langflow RCE Within 20 Hours of Disclosure

Researchers warn the advisory enabled exploits faster than typical patch cycles.

Overview

  • Sysdig observed active exploitation of CVE-2026-33017 roughly 20 hours after the public advisory, despite no public proof‑of‑concept code.
  • CVE-2026-33017 (CVSS 9.3) enables unauthenticated remote code execution via a POST endpoint that executes attacker-supplied Python in a single request.
  • Activity progressed from automated mass scanning to targeted payload delivery and credential exfiltration, with traffic funneled to a shared command‑and‑control server.
  • Stolen data included keys, database credentials and environment variables, raising risks of unauthorized database access and potential supply‑chain compromise.
  • Langflow maintainers released a patched build on March 17, and guidance urges immediate updating, key rotation, secret audits and tighter network access controls.