{"data":{"id":"30a343b3-f15d-4189-a2e3-94601d49b73a","title":"Attackers exploit critical Langflow RCE within hours as CISA sounds alarm","summary":"Attackers exploited a critical vulnerability (CVE-2026-33017) in Langflow, an open-source tool for building AI pipelines, within hours of its public disclosure, allowing them to run arbitrary code on unprotected systems without credentials. The flaw stems from an exposed API endpoint that accepts malicious Python code in workflow data and executes it without sandboxing or authentication checks. CISA added it to its Known Exploited Vulnerabilities catalog and urged federal agencies to patch by April 8, 2026.","solution":"Upgrade to patched versions: the vulnerability affects Langflow versions up to (excluding) 1.8.2 and has been fixed in v1.9.0. Additionally, restrict exposure of vulnerable instances, implement runtime detection rules to monitor for post-exploitation behavior (such as shell commands executed via Python), and monitor for anomalous activity, treating any exposed instances as potentially compromised.","labels":["security"],"sourceUrl":"https://www.csoonline.com/article/4151203/attackers-exploit-critical-langflow-rce-within-hours-as-cisa-sounds-alarm.html","publishedAt":"2026-03-27T12:03:06.000Z","cveId":null,"cweIds":null,"cvssScore":null,"cvssSeverity":null,"severity":"critical","attackType":["supply_chain"],"issueType":"news","affectedPackages":null,"affectedVendors":["LangChain"],"affectedVendorsRaw":["Langflow"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":null,"epssScore":null,"patchAvailable":null,"disclosureDate":"2026-03-27T12:03:06.000Z","capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["confidentiality","integrity","availability"],"aiComponentTargeted":"api","llmSpecific":false,"classifierConfidence":0.95,"researchCategory":null,"atlasIds":null}}