CVE-2026-0771
Unknown Unknown - Not Provided
PythonFunction Code Injection in Langflow Enables Remote Code Execution

Publication date: 2026-01-23

Last updated on: 2026-02-18

Assigner: Zero Day Initiative

Description
Langflow PythonFunction Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Attack vectors and exploitability will vary depending on the configuration of the product. The specific flaw exists within the handling of Python function components. Depending upon product configuration, an attacker may be able to introduce custom Python code into a workflow. An attacker can leverage this vulnerability to execute code in the context of the application. Was ZDI-CAN-27497.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-23
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
langflow langflow 1.4.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-0771 is a remote code execution vulnerability in Langflow that arises from improper handling of Python function components. It allows remote attackers to inject and execute arbitrary Python code within workflows, potentially running code with the application's privileges. The exploitability and attack methods depend on how the product is configured. [1]


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute arbitrary code remotely on affected Langflow installations, which can lead to full compromise of the application. This includes unauthorized access, modification, or deletion of data, disruption of service, and potential further attacks within the environment. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart