PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-33017 Langflow CVE debrief

CVE-2026-33017 is a Langflow code injection vulnerability that CISA added to the Known Exploited Vulnerabilities catalog on 2026-03-25. That KEV listing means CISA considers the issue actively exploited and recommends prompt mitigation. The supplied corpus does not include affected versions or a technical breakdown, so defenders should treat this as an urgent exposure review item for any Langflow deployment.

Vendor
Langflow
Product
Langflow
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2026-03-25
Original CVE updated
2026-03-25
Advisory published
2026-03-25
Advisory updated
2026-03-25

Who should care

Security and platform teams running Langflow, especially in cloud or externally reachable environments, should prioritize this issue. Asset owners, vulnerability management teams, and incident responders should also review whether Langflow is deployed anywhere in their environment.

Technical summary

The official material in the supplied corpus identifies the issue as a Langflow code injection vulnerability. CISA’s KEV entry points to the vendor’s GitHub security advisory and the NVD record, but the corpus provided here does not include the advisory text, affected versions, or exploitation details. The only confirmed facts are that the vulnerability is associated with Langflow, is in CISA’s KEV catalog, and has an assigned mitigation due date of 2026-04-08.

Defensive priority

High priority / urgent. KEV inclusion indicates known exploitation, and CISA’s mitigation deadline is 2026-04-08.

Recommended defensive actions

  • Inventory all Langflow instances and determine whether any are exposed to untrusted users or networks.
  • Apply vendor-recommended mitigations as soon as possible, using the linked Langflow security advisory and NVD record for version-specific guidance.
  • If mitigations are not available or cannot be applied in time, follow CISA guidance to discontinue use of the product.
  • For cloud-hosted deployments, follow applicable BOD 22-01 guidance and accelerate remediation planning.
  • Validate that logging, alerting, and incident response coverage are in place for the affected service.
  • Track the vendor advisory for fixed-version and mitigation details before making deployment changes.

Evidence notes

Confirmed evidence from the supplied corpus: CISA’s KEV JSON lists CVE-2026-33017 as "Langflow Code Injection Vulnerability," sets dateAdded to 2026-03-25, dueDate to 2026-04-08, and marks knownRansomwareCampaignUse as Unknown. The KEV metadata also references the Langflow GitHub security advisory and the NVD record. No CVSS score or affected-version details were included in the corpus.

Official resources

Publicly disclosed in CISA’s KEV catalog on 2026-03-25. The supplied corpus does not provide additional advisory text beyond the KEV entry and linked official references.