Impact
Langflow’s eval_custom_component_code function lacks proper validation of user supplied strings, allowing arbitrary Python code to be executed. This results in a remote code execution vulnerability classified under CWE‑95. An attacker can run any code within the process context without needing authentication, exposing the system to complete compromise of confidentiality, integrity, and availability.
Affected Systems
Affected installations include Langflow 1.3.2 and likely later versions that contain the unpatched eval_custom_component_code implementation. The vulnerability is present in the Langflow product distributed by the vendor identified as Langflow.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, and an EPSS score of 1% shows a low but non‑zero likelihood of exploitation. The flaw is not listed in the CISA KEV catalog. Exploitation requires remote access to the component creation or configuration endpoint but does not require authentication, making the attack vector straightforward for remote adversaries.
OpenCVE Enrichment