langflow <=1.0.18 is vulnerable to Remote Code Execution (RCE) as any component provided the code functionality and the components run on the local machine rather than in a sandbox.
References
Link | Resource |
---|---|
https://gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61 | Third Party Advisory |
https://rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8 | Exploit Third Party Advisory |
Configurations
History
28 May 2025, 20:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/AfterSnows/1e58257867002462923fd62dde2b5d61 - Third Party Advisory | |
References | () https://rumbling-slice-eb0.notion.site/There-is-a-Remote-Code-Execution-RCE-vulnerability-in-the-repository-https-github-com-langflow-a-105e3cda9e8c800fac92f1b571bd40d8 - Exploit, Third Party Advisory | |
First Time |
Langflow langflow
Langflow |
|
CPE | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* |
Information
Published : 2024-11-04 23:15
Updated : 2025-05-28 20:56
NVD link : CVE-2024-48061
Mitre link : CVE-2024-48061
CVE.ORG link : CVE-2024-48061
JSON object : View
Products Affected
langflow
- langflow
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')