{"data":{"id":"101f347b-3bf0-471f-a4b9-c1943b99fdc6","title":"CVE-2026-7687: A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the function CodeParser.pa","summary":"A command injection vulnerability (CWE-77, a flaw where attackers can insert malicious commands into input) was found in Langflow AI's langflow software up to version 1.8.4, specifically in the CodeParser.parse_callable_details function. An attacker with login credentials can remotely execute this vulnerability, and it has already been publicly disclosed. The vendor was notified but did not respond.","solution":"N/A -- no mitigation discussed in source.","labels":["security"],"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2026-7687","publishedAt":"2026-05-03T09:16:03.680Z","cveId":"CVE-2026-7687","cweIds":["CWE-74","CWE-77"],"cvssScore":"6.3","cvssSeverity":"medium","severity":"medium","attackType":["rag_poisoning"],"issueType":"vulnerability","affectedPackages":null,"affectedVendors":["LangChain"],"affectedVendorsRaw":["Langflow","langflow-ai"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","attackVector":"network","attackComplexity":"low","privilegesRequired":"low","userInteraction":"none","exploitMaturity":"unknown","epssScore":0,"patchAvailable":null,"disclosureDate":"2026-05-03T09:16:03.680Z","capecIds":["CAPEC-88"],"crossRefCount":0,"attackSophistication":"moderate","impactType":["integrity","confidentiality"],"aiComponentTargeted":"framework","llmSpecific":false,"classifierConfidence":0.85,"researchCategory":null,"atlasIds":["AML.T0020","AML.T0051.001"]}}