Critical Langflow Vulnerability Allows Malicious Code Injection - Technical Details Revealed

Cybersecurity researchers have uncovered a critical remote code execution (RCE) vulnerability in Langflow, an open-source platform widely used for visually composing AI-driven agents and workflows. The security flaw affects all Langflow versions prior to 1.3.0 and enables attackers to execute arbitrary commands on vulnerable servers without requiring authentication, potentially compromising sensitive data and systems. The researchers emphasized that this vulnerability demonstrates the critical importance of implementing proper authentication and sandboxing measures when working with dynamic code execution. The complete attack chain showing how attackers progress from targeting the vulnerable endpoint to achieving code execution on the server. Organizations leveraging Langflow in their AI development workflows face significant risks as attackers can exploit this flaw to gain unauthorized system access and execute commands with the privileges of the application server. The vulnerability specifically targets Langflow’s /api/v1/validate/code endpoint, which improperly invokes Python’s built-in exec() function on user-supplied code. When Langflow processes code through its validation endpoint, attackers can inject malicious payloads using two primary methods. The attack leverages Python’s function definition behavior in creative ways to achieve code execution. Examining the technical implementation reveals that Langflow’s code validation mechanism attempts to parse user-submitted code into an AST before evaluating specific components, including function definitions. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Zscaler researchers identified that the vulnerability stems from Python’s behavior during function definition processing, where decorators and default argument values are evaluated immediately. This characteristic allows malicious code embedded within these structures to execute during the Abstract Syntax Tree (AST) processing phase. The first approach embeds commands within function decorators, which execute immediately during code processing. Once access is gained, attackers can leverage the vulnerable endpoint to establish persistent access, exfiltrate data, or move laterally within affected networks. The exploit allows attackers to target publicly accessible Langflow instances or compromise internal deployments through various attack vectors. While the server’s response appears benign, the malicious code executes silently in the background, potentially creating backdoors or exfiltrating data. This implementation lacks proper authentication checks and sandboxing protections, creating a dangerous attack surface for malicious actors. Organizations using Langflow are strongly advised to upgrade immediately to version 1.3.0 or later, which requires authentication for the vulnerable endpoint. This process involves importing specified modules and executing function definitions to validate their structure, but critically fails to restrict the execution context. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 24 Apr 2025 12:05:08 +0000


Cyber News related to Critical Langflow Vulnerability Allows Malicious Code Injection - Technical Details Revealed

Critical Langflow Vulnerability Allows Malicious Code Injection - Technical Details Revealed - Cybersecurity researchers have uncovered a critical remote code execution (RCE) vulnerability in Langflow, an open-source platform widely used for visually composing AI-driven agents and workflows. The security flaw affects all Langflow versions ...
3 hours ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
CVE-2024-9277 - A vulnerability classified as problematic was found in Langflow up to 1.0.18. Affected by this vulnerability is an unknown functionality of the file \src\backend\base\langflow\interface\utils.py of the component HTTP POST Request Handler. The ...
6 months ago
Fortinet Warns of Yet Another Critical RCE Flaw - Fortinet has patched a critical remote code execution vulnerability in its FortiClient Enterprise Management Server for managing endpoint devices. The flaw, identified as CVE-2024-48788, stems from an SQL injection error in a direct-attached storage ...
1 year ago Darkreading.com CVE-2024-48788 CVE-2023-27997 CVE-2022-40684 CVE-2023-34993 CVE-2023-34991 CVE-2023-48782 CVE-2023-42783 Volt Typhoon
New Microsoft Incident Response team guide shares best practices for security teams and leaders - The incident response process can be a maze that security professionals must quickly learn to navigate-which is no easy task. Surprisingly, many organizations still lack a coordinated incident response plan, and even fewer consistently apply it. ...
1 year ago Microsoft.com
Fortinet warns of critical RCE bug in endpoint management software - Fortinet patched a critical vulnerability in its FortiClient Enterprise Management Server software that can allow attackers to gain remote code execution on vulnerable servers. FortiClient EMS enables admins to manage endpoints connected to an ...
1 year ago Bleepingcomputer.com CVE-2023-48788 CVE-2024-21762 Volt Typhoon
What is SEO Poisoning Attack? - Search engine optimization (SEO) poisoning is a type of cyber attack that infiltrates search results. It consists of malicious search engine results created by an attacker attempting to redirect someone to malicious or vulnerable webpages. It is a ...
2 years ago Heimdalsecurity.com
Opening Statement by CISA Director Jen Easterly - Chairman Gallagher, Ranking Member Krishnamoorthi, Members of the Committee, thank you for the opportunity to testify on CISA's efforts to protect the Nation from the preeminent cyber threat posed by the People's Republic of China. As America's ...
1 year ago Cisa.gov
Bybit Hack - Sophisticated Multi-Stage Attack Details Revealed - The malicious code contained an activation condition targeting specific contract addresses, along with transaction validation tampering designed to bypass security checks. Sygnia researchers identified that the earliest malicious activity began on ...
1 month ago Cybersecuritynews.com Lazarus Group
Understanding Cyber Risk Appetite - A CISO’s Approach to Risk Management - By articulating the organization’s tolerance for cyber risk, CISOs can bridge the gap between technical security considerations and business objectives, creating a balanced approach that protects the organization without impeding innovation or ...
1 day ago Cybersecuritynews.com
Critical Infrastructure At Risk: Vulnerabilities Discovered In Automatic Tank Gauging - Pedro Umbelino, Principal Research Scientist at Bitsight, says the vulnerabilities could allow malefactors to exploit ATG systems, leading to potentially catastrophic outcomes, including environmental hazards, economic disruption, and even physical ...
6 months ago Informationsecuritybuzz.com
CISA Warns Of Critical Vulnerabilities Switches Used In Critical Manufacturing - The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication ...
6 months ago Informationsecuritybuzz.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
6 months ago Cyberdefensemagazine.com Akira
The Psychology of Social Engineering - What Security Leaders Should Know - Creating a security culture that addresses the psychological dimensions of social engineering requires a fundamental shift in how security leaders approach human vulnerability. When examining security incidents, leaders often focus on which technical ...
2 days ago Cybersecuritynews.com
Forget Deepfakes or Phishing: Prompt Injection is GenAI's Biggest Problem - Cybersecurity professionals and technology innovators need to be thinking less about the threats from GenAI and more about the threats to GenAI from attackers who know how to pick apart the design weaknesses and flaws in these systems. Chief among ...
1 year ago Darkreading.com
Why Modern CISOs Must Be Business Translators, Not Just Technologists - This evolution means that modern CISOs must excel as technologists and business translators professionals who can bridge the gap between complex technical realities and the organization’s strategic objectives. By translating technical risks into ...
1 week ago Cybersecuritynews.com
Business Continuity in a Digital World - CISO Perspectives - By bridging the gap between technical security operations and business objectives, forward-thinking CISOs help organizations build adaptive resilience that can withstand the unpredictable nature of digital disruptions. The role of Chief Information ...
3 days ago Cybersecuritynews.com
An Inside Look at The Malware and Techniques Used in the WordPress.org Supply Chain Attack - After adding the malicious code to our Threat Intelligence Database and examining it, we quickly discovered that several other plugins were also affected. We will begin with the Blaze Widget plugin which saw the largest amount of activity in terms of ...
9 months ago Wordfence.com
A Plan to Protect Critical Infrastructure from 21st Century Threats - On April 30th, the White House released National Security Memorandum-22 on Critical Infrastructure Security and Resilience, which updates national policy on how the U.S. government protects and secures critical infrastructure from cyber and ...
10 months ago Cisa.gov
Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit - Fintech companies Wise and Affirm have revealed that the recent data breach suffered by Evolve Bank impacts some of their customers. The notorious ransomware group LockBit recently threatened to leak data allegedly stolen from the US Federal Reserve. ...
9 months ago Securityweek.com LockBit
Hacked and Exposed: BSNL's Battle Against a Dark Web Data Breach - A hacker named Ellis is now selling thousands of internet and landline records from the telecom operator BSNL on the dark web, as a result of a data breach that saw the operator suffer a data breach in the recent past. BSNL users' sensitive ...
1 year ago Cysecurity.news
Researchers Uncovered Hacking Tools and Techniques Discussed on Russian-Speaking Hacking Forums - Trend Micro researchers noted that these Russian-speaking forums operate with a unique hierarchical structure where established members provide mentorship and technical guidance to newcomers, creating a self-perpetuating ecosystem of cybercriminal ...
2 weeks ago Cybersecuritynews.com
One Phish, Two Phish, Red Phish, Blue Phish - I sat down for a chat with George Skouroupathis, our phishing expert at Resonance Security. Phishing is often the first step taken by hackers in a larger scam. There are lots of different kinds of phishing attacks, but one of the most prevalent is ...
10 months ago Hackread.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
1 week ago Cybersecuritynews.com
Microsoft Services Down: Xbox, Azure, Teams, Office 365 Experiencing Technical Difficulties - Microsoft services including Xbox, Azure and Office 365 are reportedly down. Several Microsoft users have started to complain about technical difficulties online. Many of them have mentioned that they can no longer sign in to Xbox and other Microsoft ...
2 years ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)