VulnerabilitiesCritical

Langflow AI Framework Vulnerability Exploited Within 20 Hours

Sunday, March 22, 2026
Global
SecurityWeek / Langflow Security Advisory

Summary

Critical CVSS 9.3 flaw (CVE-2026-33017) in AI agent framework exploited for credential theft and potential supply chain attacks shortly after disclosure.

Threat Analysis

A critical vulnerability (CVE-2026-33017) in Langflow, an open-source framework for building AI agents, was exploited by threat actors approximately 20 hours after its public disclosure. This remote code execution flaw, with a CVSS score of 9.3, allows unauthenticated attackers to execute arbitrary code due to the use of attacker-supplied flow data in public flows. Attackers have leveraged this exploit to steal API keys and credentials, potentially setting the stage for supply chain attacks targeting AI development pipelines. Exploitation attempts were observed from multiple unique IP addresses, with initial mass scans followed by active reconnaissance and data exfiltration. The rapid exploitation timeline underscores the critical importance of immediate patching and the growing threat landscape surrounding AI development tools. Organizations using Langflow must update to the patched version immediately and rotate all potentially compromised credentials.

Last updated: Mar 22, 2026, 09:16 AM

Daily Intelligence

Stay Ahead of Threats

Subscribe to receive daily threat briefings delivered to your inbox. Be the first to know about emerging security risks.

No spamUnsubscribe anytimeDaily at 9 AM