CVE-2026-0768
Remote Code Execution via Code Injection in Langflow Validate Endpoint
Publication date: 2026-01-23
Last updated on: 2026-02-18
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| langflow | langflow | 1.4.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-0768 is a critical remote code execution vulnerability in Langflow. It occurs because the application does not properly validate user-supplied input in the 'code' parameter sent to the validate endpoint. This flaw allows remote attackers to execute arbitrary Python code on the affected system without needing to authenticate. [1]
How can this vulnerability impact me? :
This vulnerability can have a severe impact as it allows remote attackers to execute arbitrary code with root privileges on affected Langflow installations. This means attackers can take full control of the system, potentially leading to data theft, system compromise, or disruption of services. [1]