CVE-2024-48061: Langflow: RCE via unsandboxed code component execution
GHSA-5p5r-57fx-pmfr CRITICAL PoC AVAILABLE CISA: ATTENDAny Langflow instance ≤1.0.18 exposed to the network is fully compromised with zero barriers — no auth, no complexity, no user interaction required (CVSS 9.8). Attackers can execute arbitrary code on the host, accessing AI API keys, model artifacts, training data, and pivoting to connected infrastructure. Immediately audit for exposed Langflow deployments, restrict to VPN/internal access only, and treat any internet-facing instance as already compromised pending forensic review.
Risk Assessment
Severity is maximum. The CVSS 9.8 vector (AV:N/AC:L/PR:N/UI:N) means exploitation requires only network reachability — no credentials, no complex conditions, no victim interaction. EPSS of 10.2% indicates meaningful real-world exploitation probability within 30 days of scoring. Langflow is widely adopted in enterprise AI development environments, often deployed with broad internal network access and privileged credentials for LLM APIs. The absence of sandboxing is architectural, not incidental — all code components execute directly on the host OS, making the blast radius equivalent to full server compromise.
Affected Systems
Severity & Risk
Attack Surface
Recommended Action
7 steps-
IMMEDIATE
Identify all Langflow instances via asset inventory and network scans.
-
ISOLATE
If running ≤1.0.18, block public/intranet access immediately — restrict to localhost or VPN with allowlisted IPs via firewall rules.
-
PATCH
Upgrade to the latest Langflow release and verify sandboxing controls are present in release notes.
-
ASSUME BREACH
For any internet-exposed instance, rotate all credentials stored on or accessible from the host (LLM API keys, DB passwords, cloud credentials).
-
DETECT
Review process execution logs for the Langflow service process — look for spawned child processes, outbound connections on non-standard ports, or file writes outside the Langflow data directory.
-
HARDEN
Run Langflow in a container with no-new-privileges, read-only root filesystem where possible, and network egress restrictions.
-
MONITOR
Alert on any code component execution that spawns subprocess calls or makes unexpected network connections.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-48061?
Any Langflow instance ≤1.0.18 exposed to the network is fully compromised with zero barriers — no auth, no complexity, no user interaction required (CVSS 9.8). Attackers can execute arbitrary code on the host, accessing AI API keys, model artifacts, training data, and pivoting to connected infrastructure. Immediately audit for exposed Langflow deployments, restrict to VPN/internal access only, and treat any internet-facing instance as already compromised pending forensic review.
Is CVE-2024-48061 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-48061, increasing the risk of exploitation.
How to fix CVE-2024-48061?
1. IMMEDIATE: Identify all Langflow instances via asset inventory and network scans. 2. ISOLATE: If running ≤1.0.18, block public/intranet access immediately — restrict to localhost or VPN with allowlisted IPs via firewall rules. 3. PATCH: Upgrade to the latest Langflow release and verify sandboxing controls are present in release notes. 4. ASSUME BREACH: For any internet-exposed instance, rotate all credentials stored on or accessible from the host (LLM API keys, DB passwords, cloud credentials). 5. DETECT: Review process execution logs for the Langflow service process — look for spawned child processes, outbound connections on non-standard ports, or file writes outside the Langflow data directory. 6. HARDEN: Run Langflow in a container with no-new-privileges, read-only root filesystem where possible, and network egress restrictions. 7. MONITOR: Alert on any code component execution that spawns subprocess calls or makes unexpected network connections.
What systems are affected by CVE-2024-48061?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, LLM workflow builders, RAG pipelines, AI development environments, multi-agent orchestration.
What is the CVSS score for CVE-2024-48061?
CVE-2024-48061 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 13.20%.
Technical Details
NVD Description
langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox.
Exploitation Scenario
An adversary scans the internet for exposed Langflow instances (port 7860/7861 or custom). Upon locating a target, they access the Langflow UI without authentication and create or import a flow containing a Python code component. The component embeds a reverse shell payload (e.g., subprocess spawning a bash reverse shell to an attacker-controlled server) or directly reads and exfiltrates environment variables containing LLM API keys. Since the code runs directly on the host OS under the Langflow process's privileges, the attacker gains immediate shell access. From there, they harvest API keys for OpenAI, Anthropic, or enterprise LLM gateways, enabling AI cost abuse, data exfiltration from connected vector databases, and lateral movement to cloud environments via stored credentials. The entire kill chain requires no prior knowledge of the target — the Langflow UI itself is the exploit surface.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61 3rd Party
- rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8 Exploit 3rd Party
- github.com/advisories/GHSA-5p5r-57fx-pmfr
- github.com/langflow-ai/langflow/issues/696
- nvd.nist.gov/vuln/detail/CVE-2024-48061
- github.com/BwithE/CVE-2024-48061 Exploit
- github.com/plzheheplztrying/cve_monitor Exploit
- github.com/zulloper/cve-poc Exploit
Timeline
Related Vulnerabilities
CVE-2026-33309 9.9 langflow: Path Traversal enables file access
Same package: langflow CVE-2024-37014 9.8 Langflow: unauthenticated RCE via custom component API
Same package: langflow CVE-2026-27966 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2026-33017 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2024-42835 9.8 Langflow: Unauthenticated RCE via PythonCodeTool
Same package: langflow
AI Threat Alert