CVE-2026-0769

UNKNOWN
Published January 23, 2026
CISO Take

Langflow deployments exposed to the internet are trivially exploitable for unauthenticated remote code execution — no credentials needed. Any org running Langflow as part of their AI pipeline infrastructure should treat this as a P0: patch or network-isolate immediately. Until patched, restrict Langflow to internal networks only and audit for indicators of compromise.

Affected Systems

Package Ecosystem Vulnerable Range Patched
langflow pip No patch

Do you use langflow? You're affected.

Severity & Risk

CVSS 3.1
N/A
EPSS
N/A
KEV Status
Not in KEV
Sophistication
Trivial

Recommended Action

  1. 1. IMMEDIATE: Isolate all Langflow instances behind VPN or internal network — remove any public internet exposure. 2. PATCH: Apply vendor patch as soon as released; monitor ZDI advisory ZDI-26-035 and Langflow GitHub for patch ETA. 3. WORKAROUND (if patch unavailable): Disable custom component functionality via Langflow configuration or block the eval_custom_component_code API endpoint at the WAF/reverse proxy layer. 4. ROTATE CREDENTIALS: Assume any previously internet-exposed Langflow instance is compromised — rotate all LLM provider API keys, vector DB credentials, and any secrets accessible to the Langflow process. 5. DETECT: Search logs for anomalous outbound connections from Langflow hosts, unexpected process spawning, and unusual POST requests to component evaluation endpoints. 6. AUDIT: Review Langflow access logs for exploitation attempts — look for payloads containing import, os, subprocess, socket, or base64 patterns in component code fields.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
6.1.2 - AI risk assessment 8.1 - Operational planning and control A.6.2.2 - AI System Security — Access Control A.6.2.6 - AI System Security — Input Validation
NIST AI RMF
GOVERN 1.7 - Processes for identifying and managing AI risks GOVERN 6.2 - Risk Management — Policies for AI system security MANAGE 2.2 - Mechanisms to sustain value of deployed AI systems
OWASP LLM Top 10
LLM02 - Insecure Output Handling LLM07 - Insecure Plugin Design LLM08 - Excessive Agency

Technical Details

NVD Description

Langflow eval_custom_component_code Eval Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of eval_custom_component_code function. The issue results from the lack of proper validation of a user-supplied string before using it to execute python code. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26972.

Exploitation Scenario

An adversary scans for Langflow instances via Shodan or direct HTTP fingerprinting (Langflow exposes identifiable UI/API endpoints). Without any authentication, they craft an HTTP POST to the eval_custom_component_code endpoint containing a Python reverse shell payload (e.g., importing subprocess and connecting back to attacker-controlled infrastructure). The Langflow server evaluates the payload and executes it in-process. The attacker now has a shell running as the Langflow service account, reads environment variables and configuration files to harvest LLM API keys and database credentials, exfiltrates the keys, and installs a persistent backdoor. In an agentic deployment, the attacker may also modify pipeline logic to inject malicious instructions into LLM prompts, causing the AI agent to exfiltrate user data or take unauthorized actions on connected tools.

Weaknesses (CWE)

Timeline

Published
January 23, 2026
Last Modified
February 18, 2026
First Seen
January 23, 2026