CVE-2026-33309

CRITICAL

Langflow has an Arbitrary File Write (RCE) via v2 API

Title source: cna
STIX 2.1

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to the root architectural issue within `LocalStorageService` remaining unresolved. Because the underlying storage layer lacks boundary containment checks, the system relies entirely on the HTTP-layer `ValidatedFileName` dependency. This defense-in-depth failure leaves the `POST /api/v2/files/` endpoint vulnerable to Arbitrary File Write. The multipart upload filename bypasses the path-parameter guard, allowing authenticated attackers to write files anywhere on the host system, leading to Remote Code Execution (RCE). Version 1.9.0 contains an updated fix.

Scores

CVSS v3 9.9
EPSS 0.0005
EPSS Percentile 14.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-22 CWE-284 CWE-73 CWE-94
Status published
Products (3)
langflow/langflow 1.2.0 - 1.9.0
langflow-ai/langflow >= 1.2.0, < 1.9.0
pypi/langflow 1.2.0 - 1.9.0PyPI
Published Mar 24, 2026
Tracked Since Mar 24, 2026