Particle.news
Download on the App Store

CISA Adds Actively Exploited Langflow RCE to KEV, Sets April 8 Deadline

CISA moved to mandate fixes after attackers abused a public build endpoint to run Python code without login.

Overview

  • CVE-2026-33017, which CISA added to its Known Exploited Vulnerabilities catalog Thursday, now carries an April 8 remediation deadline for federal civilian agencies.
  • The flaw lets anyone send a crafted request to Langflow’s public build endpoint that feeds attacker-supplied flow data into Python exec with no sandboxing, enabling remote code execution.
  • Researchers at Endor Labs and Sysdig reported exploitation within about 20 hours of the advisory’s publication, with no public proof-of-concept, followed by theft of .env and .db files containing keys and credentials.
  • Langflow maintainers fixed the issue in version 1.9.0, and guidance urges upgrading or restricting the vulnerable endpoint, keeping instances off the open internet, monitoring outbound traffic, and rotating exposed secrets.
  • The project’s broad use for wiring AI workflows into databases and APIs heightens risk because stolen credentials can unlock connected services and trigger downstream compromise.