CVE-2026-27966

CRITICAL

Langflow <1.8.0 - RCE

Title source: llm

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically exposes LangChain’s Python REPL tool (`python_repl_ast`). As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection, leading to full Remote Code Execution (RCE). Version 1.8.0 fixes the issue.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-27966
nomisec WORKING POC
by Anon-Cyber-Team · poc
https://github.com/Anon-Cyber-Team/CVE-2026-27966--RCE-in-Langflow

Scores

CVSS v3 9.8
EPSS 0.0041
EPSS Percentile 60.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-94
Status published

Affected Products (2)

pypi/langflow PyPI
langflow/langflow < 1.8.0

Timeline

Published Feb 26, 2026
Tracked Since Feb 26, 2026