CVE-2026-33309

GHSA-g2j9-7rj2-gm6c CRITICAL
Published March 24, 2026
CISO Take

CVE-2026-33309 is a critical RCE in Langflow (CVSS 9.9) that bypasses the previously-issued patch for CVE-2025-68478. Any authenticated user — including trial accounts — can write arbitrary files to the host via a crafted multipart upload, leading to full system compromise. Upgrade to Langflow 1.9.0 immediately; if patching is not possible today, restrict access to the file upload endpoint and audit all authenticated accounts.

Affected Systems

Package Ecosystem Vulnerable Range Patched
langflow pip >= 1.2.0, <= 1.8.1 1.9.0

Do you use langflow? You're affected.

Severity & Risk

CVSS 3.1
9.9 / 10
EPSS
N/A
KEV Status
Not in KEV
Sophistication
Trivial

Recommended Action

  1. 1. PATCH: Upgrade Langflow to version 1.9.0 immediately — this is the only complete fix. 2. WORKAROUND (if patching is delayed): Block or rate-limit POST /api/v2/files/ at the WAF/reverse proxy layer; require additional authentication for file upload operations. 3. AUDIT: Review all user accounts with access to the Langflow instance; revoke unnecessary low-privilege accounts. 4. DETECT: Monitor for unexpected file creation events outside Langflow's designated storage directory (e.g., writes to /etc/, /home/, Python site-packages, or cron directories); alert on new processes spawned by the Langflow service user. 5. ISOLATE: Run Langflow in a minimal container with read-only filesystem mounts where possible; restrict the service account to least-privilege OS permissions. 6. VERIFY: Scan your Langflow deployment logs for POST /api/v2/files/ requests with filenames containing '../', '%2e', encoded slashes, or absolute paths.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art.15 - Accuracy, Robustness and Cybersecurity Art.9 - Risk Management System
ISO 42001
A.6.1.2 - Information Security in AI System Development and Operation A.9.1 - AI System Risk Treatment
NIST AI RMF
GOVERN-1.7 - Processes and procedures are in place for decommissioning AI systems MANAGE-2.2 - Mechanisms to sustain AI risk management are planned
OWASP LLM Top 10
LLM05 - Supply Chain Vulnerabilities LLM07 - Insecure Plugin Design LLM08 - Excessive Agency

Technical Details

NVD Description

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to the root architectural issue within `LocalStorageService` remaining unresolved. Because the underlying storage layer lacks boundary containment checks, the system relies entirely on the HTTP-layer `ValidatedFileName` dependency. This defense-in-depth failure leaves the `POST /api/v2/files/` endpoint vulnerable to Arbitrary File Write. The multipart upload filename bypasses the path-parameter guard, allowing authenticated attackers to write files anywhere on the host system, leading to Remote Code Execution (RCE). Version 1.9.0 contains an updated fix.

Exploitation Scenario

An attacker with a low-privilege Langflow account (e.g., a compromised trial user or an insider threat) crafts a multipart HTTP POST to /api/v2/files/ with a filename such as '../../usr/lib/python3/dist-packages/langflow/malicious.py' or a path targeting a cron directory. The HTTP-layer ValidatedFileName check is bypassed because the underlying LocalStorageService performs no boundary containment — the filename passes through the storage layer unchanged. The server writes attacker-controlled Python code to the target path. On next Langflow process restart or scheduled execution, the injected module is imported and the attacker's payload executes with Langflow's process privileges. From there, the attacker establishes a reverse shell, exfiltrates API keys and LLM credentials stored in Langflow's configuration, poisons agent tool definitions to affect downstream AI pipeline consumers, and potentially pivots to connected databases or cloud infrastructure.

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Timeline

Published
March 24, 2026
Last Modified
March 24, 2026
First Seen
March 24, 2026