CVE-2024-37014: Langflow: unauthenticated RCE via custom component API
GHSA-qg33-x2c5-6p44 CRITICAL PoC AVAILABLE CISA: ATTENDAny Langflow instance below 1.0.15 with the API exposed to untrusted networks is fully compromised on a single unauthenticated POST request—no credentials, no interaction required. Patch immediately to 1.0.15+ or firewall the /api/v1/custom_component endpoint as an emergency workaround. Audit whether Langflow is internet-facing in your AI development or production environments; this is not a theoretical risk.
Risk Assessment
Extremely high. CVSS 9.8 with AV:N/AC:L/PR:N/UI:N means any attacker with network reach can execute arbitrary Python on the host—no authentication, no complexity, no user involvement. Langflow is widely deployed as an LLM workflow builder in both dev and prod AI environments, often with privileged access to LLM APIs, vector stores, and internal data. EPSS of 6.5% indicates measurable real-world exploitation interest. The absence from CISA KEV does not mean safe—this class of unauthenticated RCE is trivially weaponized.
Affected Systems
Severity & Risk
Attack Surface
Recommended Action
1 step-
1) Patch: Upgrade to Langflow 1.0.15 or later immediately—this is the only complete fix. 2) Emergency workaround (if patching is blocked): Restrict network access to /api/v1/custom_component via WAF rule or reverse proxy ACL; allow only authenticated admin IPs. 3) Network segmentation: Langflow should never be directly internet-facing; place behind VPN or internal network boundary. 4) Audit credentials: Rotate all LLM API keys, DB credentials, and service tokens stored in or accessible from the Langflow instance—assume compromise if exposed. 5) Detection: Search logs for POST requests to /api/v1/custom_component from unexpected source IPs. Monitor for anomalous process spawning from the Langflow process. 6) Verify: Confirm your deployed version with 'pip show langflow'.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-37014?
Any Langflow instance below 1.0.15 with the API exposed to untrusted networks is fully compromised on a single unauthenticated POST request—no credentials, no interaction required. Patch immediately to 1.0.15+ or firewall the /api/v1/custom_component endpoint as an emergency workaround. Audit whether Langflow is internet-facing in your AI development or production environments; this is not a theoretical risk.
Is CVE-2024-37014 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-37014, increasing the risk of exploitation.
How to fix CVE-2024-37014?
1) Patch: Upgrade to Langflow 1.0.15 or later immediately—this is the only complete fix. 2) Emergency workaround (if patching is blocked): Restrict network access to /api/v1/custom_component via WAF rule or reverse proxy ACL; allow only authenticated admin IPs. 3) Network segmentation: Langflow should never be directly internet-facing; place behind VPN or internal network boundary. 4) Audit credentials: Rotate all LLM API keys, DB credentials, and service tokens stored in or accessible from the Langflow instance—assume compromise if exposed. 5) Detection: Search logs for POST requests to /api/v1/custom_component from unexpected source IPs. Monitor for anomalous process spawning from the Langflow process. 6) Verify: Confirm your deployed version with 'pip show langflow'.
What systems are affected by CVE-2024-37014?
This vulnerability affects the following AI/ML architecture patterns: LLM workflow orchestration platforms, Agent frameworks, AI development environments, Model serving pipelines, RAG pipelines.
What is the CVSS score for CVE-2024-37014?
CVE-2024-37014 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 6.50%.
Technical Details
NVD Description
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
Exploitation Scenario
Attacker discovers a Langflow instance via Shodan or known internal inventory. They send a single unauthenticated HTTP POST to /api/v1/custom_component with a JSON body containing a malicious Python script—e.g., a reverse shell payload or credential harvester. Langflow evaluates the script server-side with no sandboxing. The attacker immediately gains shell access, enumerates environment variables to extract LLM API keys and DB credentials, and pivots to connected AI infrastructure. In an agentic deployment, the attacker can inject malicious component logic that persists across legitimate workflow runs, silently exfiltrating data or manipulating AI outputs without raising alerts.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2026-33309 9.9 langflow: Path Traversal enables file access
Same package: langflow CVE-2024-48061 9.8 Langflow: RCE via unsandboxed code component execution
Same package: langflow CVE-2026-27966 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2026-33017 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2024-42835 9.8 Langflow: Unauthenticated RCE via PythonCodeTool
Same package: langflow
AI Threat Alert