top of page
perceptive_background_267k.jpg

Langflow is a tool for building and deploying AI-powered agents and workflows. An unauthenticated remote shell injection vulnerability exists in multiple GitHub…

Published:

23 maart 2026 om 23:00:00

Alert date:

24 maart 2026 om 19:05:20

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies, Web Technologies

CVE-2026-33475 is an unauthenticated remote shell injection vulnerability in Langflow's GitHub Actions workflows prior to version 1.9.0. The vulnerability exists due to unsanitized interpolation of GitHub context variables in run steps, allowing attackers to inject arbitrary shell commands via malicious branch names or pull request titles. This can lead to secret exfiltration (GITHUB_TOKEN), infrastructure manipulation, or supply chain compromise during CI/CD execution. The vulnerability affects multiple workflow files and can be exploited by forking the repository and creating malicious branch names. Version 1.9.0 patches the vulnerability by using environment variables and proper quoting.

Technical details

Mitigation steps:

Affected products:

Langflow

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page