CVE-2026-27966

Langflow · Langflow

Langflow's CSV Agent node improperly enables dangerous code execution by default, allowing unauthenticated attackers to achieve remote code execution via prompt injection.

Executive summary

The hardcoded enablement of dangerous code execution in Langflow's CSV Agent node allows unauthenticated attackers to execute arbitrary commands on the host server.

Vulnerability

The CSV Agent node in Langflow hardcodes the allow_dangerous_code parameter to True, which exposes LangChain’s Python REPL tool. An unauthenticated attacker can leverage prompt injection to execute arbitrary Python and operating system commands.

Business impact

A successful exploit results in full Remote Code Execution (RCE) on the underlying server, potentially leading to complete system takeover. Attackers could steal proprietary AI models, access sensitive datasets, or use the server as a pivot point for lateral movement within the corporate network. The CVSS score of 9.8 reflects the critical nature of this unauthenticated execution flaw.

Remediation

Immediate Action: Upgrade Langflow to version 1.8.0 or later, which disables the dangerous default configuration.

Proactive Monitoring: Audit Langflow logs for suspicious prompt patterns or unexpected Python execution errors within the CSV Agent node.

Compensating Controls: Deploy a Web Application Firewall (WAF) with rules designed to detect and block prompt injection patterns aimed at LLM-integrated tools.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The exposure of a Python REPL tool to unauthenticated input constitutes a severe security failure. Organizations utilizing Langflow must prioritize the update to version 1.8.0 to mitigate the risk of full server compromise and data exfiltration.