DEV Community

Cover image for Critical Langflow RCE Vulnerability CVE-2026-33017 Exploited Within Hours
BeyondMachines for BeyondMachines

Posted on • Originally published at beyondmachines.net

Critical Langflow RCE Vulnerability CVE-2026-33017 Exploited Within Hours

Summary

Researchers report active exploitation of a critical RCE vulnerability (CVE-2026-33017) in Langflow that allows unauthenticated attackers to execute arbitrary Python code and steal sensitive API keys. The flaw was weaponized within 20 hours of disclosure, targeting exposed AI orchestration pipelines to harvest credentials and environment variables.

Take Action:

If you're running Langflow, this is urgent. Update immediately to version 1.9.0.dev8 or later to patch CVE-2026-33017, and disable the AUTO_LOGIN=true default setting. Until you can update, restrict network access to the vulnerable endpoint, place Langflow behind a reverse proxy with authentication. Regardless if you patch or isolate, make sure to rotate all API keys and credentials the platform uses after isolating.


Read the full article on BeyondMachines


This article was originally published on BeyondMachines

Top comments (0)