Impact
A flaw in Langflow’s validate endpoint allows an unauthenticated attacker to submit arbitrary Python code, which the server executes without validation. This code injection leads to remote code execution in the context of the running service and can result in execution as root. The vulnerability is a classic code injection weakness (CWE‑94).
Affected Systems
The affected product is Langflow version 1.4.2, as identified by the vendor.
Risk and Exploitability
The vulnerability has a CVSS score of 9.8 and an EPSS score of 2 %, indicating a high likelihood of exploitation. It is not currently listed in the CISA KEV catalog. Authentication is not required, and the attack vector is remote via network traffic to the validate endpoint. An attacker can achieve full system compromise, as the code runs under root privileges. The high severity score reflects the potential for extensive damage across the affected installation.
OpenCVE Enrichment