Description
Langflow eval_custom_component_code Eval Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of eval_custom_component_code function. The issue results from the lack of proper validation of a user-supplied string before using it to execute python code. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26972.
Published: 2026-01-23
Score: 9.8 Critical
EPSS: 1.9% Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Langflow’s eval_custom_component_code function lacks proper validation of user supplied strings, allowing arbitrary Python code to be executed. This results in a remote code execution vulnerability classified under CWE‑95. An attacker can run any code within the process context without needing authentication, exposing the system to complete compromise of confidentiality, integrity, and availability.

Affected Systems

Affected installations include Langflow 1.3.2 and likely later versions that contain the unpatched eval_custom_component_code implementation. The vulnerability is present in the Langflow product distributed by the vendor identified as Langflow.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity, and an EPSS score of 1% shows a low but non‑zero likelihood of exploitation. The flaw is not listed in the CISA KEV catalog. Exploitation requires remote access to the component creation or configuration endpoint but does not require authentication, making the attack vector straightforward for remote adversaries.

Generated by OpenCVE AI on April 18, 2026 at 03:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Langflow to a version that includes the patch for eval_custom_component_code.
  • Disable direct use of eval_custom_component_code or restrict access to trusted users only, applying the principle of least privilege.
  • Configure application firewalls or input validation layers to detect and block malicious code payloads before they reach the eval function.

Generated by OpenCVE AI on April 18, 2026 at 03:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:langflow:langflow:1.3.2:*:*:*:*:*:*:*

Fri, 23 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Langflow
Langflow langflow
Vendors & Products Langflow
Langflow langflow

Fri, 23 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description Langflow eval_custom_component_code Eval Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of eval_custom_component_code function. The issue results from the lack of proper validation of a user-supplied string before using it to execute python code. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26972.
Title Langflow eval_custom_component_code Eval Injection Remote Code Execution Vulnerability
Weaknesses CWE-95
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Langflow Langflow
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-02-26T14:44:26.824Z

Reserved: 2026-01-08T22:50:18.918Z

Link: CVE-2026-0769

cve-icon Vulnrichment

Updated: 2026-01-23T16:32:29.303Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T04:16:03.933

Modified: 2026-02-18T16:43:31.297

Link: CVE-2026-0769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:30:25Z

Weaknesses