1.4.3
CVE-2026-0771 is a Remote Code Execution (RCE) vulnerability affecting Langflow versions 1.4.2 through 1.4.2. This flaw resides within the handling of Python function components, allowing attackers to inject malicious Python code into workflows. Successful exploitation can lead to arbitrary code execution on the affected system, potentially compromising the entire application and its underlying infrastructure. A patch is expected to be released by the vendor.
The impact of CVE-2026-0771 is significant due to the potential for arbitrary code execution. An attacker who successfully exploits this vulnerability can gain complete control over the affected Langflow instance. This could involve stealing sensitive data, modifying application behavior, installing malware, or using the compromised system as a launchpad for further attacks against the network. The attack vector involves injecting custom Python code into a workflow, which then executes with the privileges of the Langflow application. This is similar to other code injection vulnerabilities where untrusted input is directly executed, bypassing security controls. The blast radius extends to any data processed by the Langflow application and any systems accessible from the compromised instance.
CVE-2026-0771 was disclosed on 2026-01-23. Public proof-of-concept (POC) code is currently unknown, but the vulnerability's nature suggests it is likely to be developed. The EPSS score is pending evaluation, but the RCE nature of the vulnerability suggests a medium to high probability of exploitation. This vulnerability was initially reported as ZDI-CAN-27497.
Organizations utilizing Langflow for workflow automation, particularly those integrating user-supplied data into Python functions, are at significant risk. Environments with limited security controls or those running Langflow with elevated privileges are especially vulnerable. Shared hosting environments where multiple users share the same Langflow instance should also be considered at higher risk.
• python / server:
Get-Process -Name "langflow"• python / server:
ps aux | grep "langflow"• python / server:
journalctl -u langflow -f | grep "Python function"disclosure
漏洞利用状态
EPSS
0.12% (31% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2026-0771 is to upgrade to a patched version of Langflow as soon as it becomes available. Until a patch is released, consider implementing temporary workarounds to reduce the risk of exploitation. One approach is to implement Web Application Firewall (WAF) rules to filter suspicious Python code being passed to the Python function component. Carefully review and sanitize all user-supplied input before incorporating it into Python code. Restrict the permissions of the user account running the Langflow application to minimize the potential damage from a successful exploit. After upgrading, confirm the vulnerability is resolved by attempting to inject a benign Python payload and verifying that it is not executed.
Actualice Langflow a una versión posterior a la 1.4.2. Esto solucionará la vulnerabilidad de inyección de código Python en la función PythonFunction.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2026-0771 is a Remote Code Execution vulnerability in Langflow versions 1.4.2–1.4.2, allowing attackers to inject and execute Python code within workflows.
If you are running Langflow version 1.4.2, you are potentially affected. Upgrade to a patched version as soon as it's available.
The recommended fix is to upgrade to a patched version of Langflow. Until a patch is available, implement WAF rules and sanitize user input.
While no active exploitation has been confirmed, the RCE nature of the vulnerability suggests it is likely to be targeted.
Refer to the Langflow official website and security advisories for updates and the latest information regarding CVE-2026-0771.
上传你的 requirements.txt 文件,立即知道是否受影响。