CVE-2026-7466
AgentFlow · AgentFlow
AgentFlow is vulnerable to arbitrary code execution, allowing attackers to execute local Python files via the pipeline_path parameter in specific API endpoints.
Executive summary
AgentFlow contains a critical arbitrary code execution vulnerability that allows an attacker to execute arbitrary Python files on the host system.
Vulnerability
The vulnerability is an arbitrary code execution flaw residing in the POST /api/runs and POST /api/runs/validate endpoints. An attacker can supply a malicious, user-controlled pipeline_path parameter to execute local Python pipeline files, which may occur with high-level system privileges.
Business impact
The CVSS score of 8.8 reflects the extreme risk associated with arbitrary code execution. A successful exploit could lead to a full system compromise, allowing an attacker to gain persistent access, steal data, or deploy malware within the server environment, resulting in severe operational impact.
Remediation
Immediate Action: Update AgentFlow to the latest version provided by the vendor immediately; this is a critical security update.
Proactive Monitoring: Monitor API logs for unexpected POST requests to /api/runs or /api/runs/validate containing suspicious file paths.
Compensating Controls: Disable access to the affected API endpoints at the network edge or via a WAF if immediate patching is not feasible.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability is critical due to the potential for arbitrary code execution. Administrators must prioritize patching these endpoints immediately to prevent potential system-wide compromise.