CVE-2026-0770

CRITICAL EXPLOITED NUCLEI

Langflow - RCE

Title source: llm

Description

Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the exec_globals parameter provided to the validate endpoint. The issue results from the inclusion of a resource from an untrusted control sphere. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27325.

Exploits (4)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-0770
nomisec WORKING POC 1 stars
by affix · remote
https://github.com/affix/CVE-2026-0770-PoC
nomisec WORKING POC
by 0xgh057r3c0n · remote
https://github.com/0xgh057r3c0n/CVE-2026-0770
nomisec SUSPICIOUS
by Yetazyyy · poc
https://github.com/Yetazyyy/CVE-2026-0770

Nuclei Templates (1)

Langflow < 1.3.0 - Remote Code Execution via validate_code() exec()
CRITICALVERIFIEDby affix
Shodan: title:"Langflow"
FOFA: title="Langflow"

Scores

CVSS v3 9.8
EPSS 0.1001
EPSS Percentile 92.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2026-02-14

Classification

CWE
CWE-829
Status published

Affected Products (2)

langflow/langflow
pypi/langflow PyPI

Timeline

Published Jan 23, 2026
Tracked Since Feb 18, 2026