Impact
A flaw in Langflow's handling of Python function components permits attackers to inject custom Python code, resulting in the execution of arbitrary code within the application’s context. This weakness aligns with CWE‑94, which covers incorrect handling of dynamic code execution. The impact is the loss of integrity and availability for the affected system, as malicious code can be run with the application’s privileges.
Affected Systems
Langflow version 1.4.2 is affected, according to the CPE identifier. No other versions are explicitly listed; users running this or earlier versions should verify vendor advisories for additional impacted releases.
Risk and Exploitability
The CVSS score for this vulnerability is 7.1, indicating a high severity level. The EPSS score of less than 1% implies a low current exploitation probability, and the vulnerability is not included in the CISA KEV catalog. The likely attack vector is remote, through the configuration of Python function components in a workflow, and exploitation is contingent on the product’s configuration settings. Based on the description, it is inferred that an attacker can inject code by creating or modifying a workflow that contains a Python function component.
OpenCVE Enrichment