Overview
- Sysdig observed active exploitation of CVE-2026-33017 roughly 20 hours after the public advisory, despite no public proof‑of‑concept code.
- CVE-2026-33017 (CVSS 9.3) enables unauthenticated remote code execution via a POST endpoint that executes attacker-supplied Python in a single request.
- Activity progressed from automated mass scanning to targeted payload delivery and credential exfiltration, with traffic funneled to a shared command‑and‑control server.
- Stolen data included keys, database credentials and environment variables, raising risks of unauthorized database access and potential supply‑chain compromise.
- Langflow maintainers released a patched build on March 17, and guidance urges immediate updating, key rotation, secret audits and tighter network access controls.