CISA: New Langflow flaw actively exploited to hijack AI workflows
Recorded: March 26, 2026, 9 p.m.
| Original | Summarized |
CISA: New Langflow flaw actively exploited to hijack AI workflows News Featured Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens HackerOne discloses employee data breach after Navia hack Firefox now has a free built-in VPN with 50GB monthly data limit Infinite Campus warns of breach after ShinyHunters claims data theft Ajax football club hack exposed fan data, enabled ticket hijack CISA: New Langflow flaw actively exploited to hijack AI workflows Edit, convert, and sign PDFs without switching apps for just $40 UK sanctions Xinbi marketplace linked to Asian scam centers Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityCISA: New Langflow flaw actively exploited to hijack AI workflows CISA: New Langflow flaw actively exploited to hijack AI workflows By Bill Toulas March 26, 2026 The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents. Red Report 2026: Why Ransomware Encryption Dropped 38% Related Articles: Actively Exploited Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment Not a member yet? Register Now You may also like: Popular Stories Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens New KB5085516 emergency update fixes Microsoft account sign-in Crunchyroll probes breach after hacker claims to steal 6.8M users' data Sponsor Posts Are your AI accounts being sold on the dark web? Check for free. Overdue a password health-check? Audit your Active Directory for free AI is a data-breach time bomb: Read the new report Synthetic Identities, Proxies & Real Identities for Sale, is yours next? Cyber resilience without the complexity. Join Zero Networks to stop lateral movement fast. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
CISA has issued a critical warning regarding the active exploitation of a vulnerability, CVE-2026-33017, within the Langflow framework, a popular open-source tool for constructing AI workflows. This vulnerability, assessed with a 9.3/10 severity score, enables remote code execution (RCE) without authentication, making it an attractive target for malicious actors. The Cybersecurity and Infrastructure Security Agency (CISA) has designated this as a “Known Exploited Vulnerability,” and the issue was identified by application security company Endor Labs. Within 20 hours of the vulnerability’s advisory publication, attackers began to leverage CVE-2026-33017. Notably, Endor Labs reported that the attackers bypassed the need for Proof-of-Concept (PoC) code, constructing exploits directly from the information provided in the CISA advisory. The exploitation process involved automated scanning, followed by the deployment of Python scripts for initial engagement and, subsequently, the harvesting of sensitive data, including `.env` and `.db` files. This rapid response highlights the urgency of addressing the vulnerability. Langflow, boasting 145,000 stars on GitHub, is widely adopted within the AI development ecosystem, utilizing a drag-and-drop interface to connect nodes into executable pipelines and a REST API for programmatic execution. The framework's widespread use dramatically increased its attractiveness as a target. This situation echoes a prior CISA warning in May 2025, concerning another active exploit, CVE-2025-3248, a critical API endpoint flaw also allowing unauthenticated RCE. The current vulnerability, CVE-2026-33017, specifically impacts versions 1.8.1 and earlier of Langflow, allowing attackers to inject and execute arbitrary Python code. The vulnerability’s simplicity—exploitable via a single crafted HTTP request—signifies a potentially substantial risk. CISA has set a deadline for federal agencies to implement security updates or mitigations, or cease using the product, by April 8th, 2026. System administrators are advised to upgrade to Langflow version 1.9.0 or later, which contains the necessary remediation. Alternatively, disabling or restricting the vulnerable endpoint is recommended. Endor Labs’ recommendations extend to mitigating additional risks, including preventing direct internet exposure of Langflow, establishing continuous monitoring of outbound traffic, and proactively rotating API keys, database credentials, and cloud secrets in response to any suspicious activity. CISA’s directives apply to organizations subject to Binding Operational Directive (BOD) 22-01, but the guidance is broadly applicable across the sector, serving as a benchmark for responsible action. The rapid exploitation timeline emphasizes the need for immediate vigilance and proactive security measures within organizations utilizing Langflow. |