CVE-2026-33309
Błąd w Langflow umożliwia atakującym zdalne wykonanie kodu przez zapis plików w dowolnym miejscu.
Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to the root architectural issue within `LocalStorageService` remaining unresolved. Because the underlying storage layer lacks boundary containment checks, the system relies entirely on the HTTP-layer `ValidatedFileName` dependency. This defense-in-depth failure leaves the `POST /api/v2/files/` endpoint vulnerable to Arbitrary File Write. The multipart upload filename bypasses the path-parameter guard, allowing authenticated attackers to write files anywhere on the host system, leading to Remote Code Execution (RCE). Version 1.9.0 contains an updated fix.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.9 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-24 13:16:02 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-24 19:17:15 UTC |
- https://github.com/langflow-ai/langflow/security/advisories/GHSA-g2j9-7rj2-gm6c (security-advisories@github.com) [Exploit, Mitigation, Vendor Advisory]