CVE-2026-0770
CRITICAL EXPLOITED NUCLEILangflow - RCE
Title source: llmDescription
Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the exec_globals parameter provided to the validate endpoint. The issue results from the inclusion of a resource from an untrusted control sphere. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27325.
Exploits (4)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-0770
Nuclei Templates (1)
Langflow < 1.3.0 - Remote Code Execution via validate_code() exec()
CRITICALVERIFIEDby affix
Shodan:
title:"Langflow"
FOFA:
title="Langflow"
Scores
CVSS v3
9.8
EPSS
0.1001
EPSS Percentile
92.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2026-02-14
Classification
CWE
CWE-829
Status
published
Affected Products (2)
langflow/langflow
pypi/langflow
PyPI
Timeline
Published
Jan 23, 2026
Tracked Since
Feb 18, 2026