CVE-2026-33017: Unauthenticated Code Injection in Langflow Exposes AI Pipeline Infrastructure

CVE ID: CVE-2026-33017 Vendor: Langflow Product: Langflow (all instances with public flow building enabled) CISA KEV Patch Deadline: April 8, 2026 (federal agencies)


Vulnerability Overview

Langflow, an open-source visual framework for building AI-powered pipelines and agents, contains a code injection vulnerability tracked as CVE-2026-33017. The flaw allows an unauthenticated remote attacker to inject and execute arbitrary code through the public flow-building interface without supplying any authentication credentials.

The vulnerability is classified as a code injection weakness. The attack vector is network-accessible, meaning any Langflow instance exposed to untrusted networks — including internal corporate segments where lateral movement is possible — is within scope. No user interaction is required to trigger the flaw. CISA has added CVE-2026-33017 to its Known Exploited Vulnerabilities (KEV) catalog and mandated remediation for federal civilian executive branch (FCEB) agencies by April 8, 2026.


Technical Details

Langflow's flow-building feature allows users to construct, configure, and execute AI workflows through a web-based interface. Under normal operation, this functionality is gated behind authentication controls. CVE-2026-33017 exposes a path through which a public flow endpoint accepts and processes user-supplied input without enforcing authentication checks, enabling an attacker to pass malicious code directly into the execution environment.

The injected code runs within the Langflow process context. Depending on the deployment configuration — containerized, bare-metal, or cloud-hosted — this translates to arbitrary command execution on the underlying host or container, access to environment variables and secrets (including API keys for connected LLM providers such as OpenAI or Anthropic), and potential traversal into adjacent infrastructure connected via Langflow integrations.

The attack requires no prior account, no elevated privileges, and no social engineering vector. An attacker with network access to the Langflow port can exploit this directly.


Real-World Impact

Langflow deployments commonly integrate with third-party APIs, vector databases, internal data sources, and LLM backends. A successful exploitation of CVE-2026-33017 does not confine the attacker to the Langflow UI — it grants execution within a process that frequently holds credentials and network paths to sensitive downstream systems.

Practical consequences include:

  • Credential theft: API keys for OpenAI, Anthropic, Pinecone, Weaviate, and other integrated services stored in environment variables or configuration files are accessible post-exploitation.
  • Data exfiltration: Langflow instances connected to internal document stores or databases expose that data to an unauthenticated attacker.
  • Lateral movement: From the compromised Langflow host, an attacker can probe and pivot to connected infrastructure within the same network segment.
  • Persistence: Malicious flows created during the exploitation window may persist in the environment and execute on subsequent triggers, even after initial access is remediated without a thorough audit.

Organizations running Langflow as part of internal AI tooling — a common deployment pattern for enterprise teams building retrieval-augmented generation (RAG) pipelines or agent workflows — face elevated risk if those instances are accessible beyond the deploying user's workstation.


Affected Versions

Vendor-confirmed affected version details should be verified directly against the official Langflow GitHub repository and any published security advisory. Organizations should treat all currently deployed Langflow instances as potentially affected until version-specific guidance confirms otherwise.


Patching and Mitigation Guidance

The following actions apply in order of priority:

1. Inventory Langflow deployments immediately. Identify every Langflow instance running in your environment. Classify each by network exposure: public-facing, internal-only, or developer workstation. Public-facing instances carry the highest immediate risk.

2. Apply vendor patches as soon as available. Monitor the Langflow GitHub repository and official release notes for a patched version addressing CVE-2026-33017. Federal agencies must complete patching by April 8, 2026, per CISA BOD 22-01 requirements.

3. Restrict network access to Langflow ports pending patch. Use firewall rules, security groups, or network ACLs to limit access to the Langflow service port exclusively to trusted IP ranges or authenticated VPN users. Remove any public internet exposure immediately.

4. Audit logs for exploitation indicators. Review Langflow application logs and host-level process execution logs for anomalous flow creation events, unexpected outbound connections, or process spawning from the Langflow service account. Establish a baseline of known-good flow activity to identify deviations.

5. Audit all flows created during the vulnerability window. Any flows built or modified while the instance was exposed should be treated as potentially malicious. Review flow logic, connected integrations, and any scheduled or trigger-based execution configurations for unauthorized modifications.

6. Rotate exposed credentials. If exploitation cannot be ruled out, rotate all API keys, secrets, and credentials accessible to the Langflow process — including those stored in .env files, environment variables, or connected secret managers.

7. Enforce authentication on all Langflow deployments. Review Langflow's authentication configuration and ensure no deployment operates with public flow access enabled without credential enforcement, regardless of patch status.


CISA's addition of CVE-2026-33017 to the KEV catalog reflects confirmed real-world exploitation risk. Organizations outside the federal mandate should treat the April 8, 2026 deadline as a practical urgency benchmark, not a ceiling.