CVE-2026-0770

CRITICAL EXPLOITED NUCLEI

Langflow - RCE

Title source: llm

Description

Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the exec_globals parameter provided to the validate endpoint. The issue results from the inclusion of a resource from an untrusted control sphere. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27325.

Exploits (5)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-0770
nomisec WORKING POC 1 stars
by affix · remote
https://github.com/affix/CVE-2026-0770-PoC
nomisec WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2026-0770
nomisec SUSPICIOUS
by Yetazyyy · poc
https://github.com/Yetazyyy/CVE-2026-0770
nomisec WORKING POC
by 0xgh057r3c0n · remote
https://github.com/0xgh057r3c0n/CVE-2026-0770

Nuclei Templates (1)

Langflow < 1.3.0 - Remote Code Execution via validate_code() exec()
CRITICALVERIFIEDby affix
Shodan: title:"Langflow"
FOFA: title="Langflow"

Scores

CVSS v3 9.8
EPSS 0.1186
EPSS Percentile 93.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2026-02-14
CWE
CWE-829
Status published
Products (2)
langflow/langflow 1.4.2
pypi/langflow 0PyPI
Published Jan 23, 2026
Tracked Since Feb 18, 2026