Description
Langflow Disk Cache Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is required to exploit this vulnerability.

The specific flaw exists within the disk cache service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27919.
Published: 2026-01-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch ASAP
AI Analysis

Impact

Langflow’s disk cache service contains a vulnerability that allows remote attackers to trigger deserialization of untrusted data. The flaw arises because the service does not validate user‑supplied input before deserializing it. If an attacker can supply crafted data to the cache, they can run arbitrary code with the privileges of the service account. The issue requires the attacker to be authenticated, but once credentials are available, the code execution path is straightforward. According to CVSS, this flaw is scored 7.5, reflecting a high‑impact remote code execution scenario. This flaw falls under CWE‑502, indicating a deserialization vulnerability.

Affected Systems

The vulnerability is present in Langflow version 1.5.0 dev2. All installations running this exact release or earlier versions that have not applied the patch are susceptible. No other versions are listed as affected in the current advisory.

Risk and Exploitability

The CVSS score of 7.5 places this vulnerability in the high severity range, but its EPSS score of around 1% indicates a relatively low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been widely abused. Exploitability requires valid user credentials, meaning attackers need to compromise or impersonate an account with access to the disk cache. Even with authentication, the code runs with service‑account privileges, potentially giving the attacker full control over the deployment. Security teams should treat this as a high‑risk issue while monitoring for activity that matches the exploit pattern.

Generated by OpenCVE AI on April 18, 2026 at 18:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Langflow release that patches the deserialization bug.
  • Temporarily disable the disk caching feature or clear existing cache files to stop untrusted data from being deserialized.
  • Implement strict input validation or sanitize any data that reaches the cache to exclude malicious payloads, addressing the underlying deserialization weakness (CWE‑502).
  • Restrict user privileges to the minimum necessary and monitor for anomalous behavior after authentication.

Generated by OpenCVE AI on April 18, 2026 at 18:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:langflow:langflow:1.5.0:dev2:*:*:*:*:*:*

Fri, 23 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Langflow
Langflow langflow
Vendors & Products Langflow
Langflow langflow

Fri, 23 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description Langflow Disk Cache Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is required to exploit this vulnerability. The specific flaw exists within the disk cache service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27919.
Title Langflow Disk Cache Deserialization of Untrusted Data Remote Code Execution Vulnerability
Weaknesses CWE-502
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Langflow Langflow
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-02-26T14:44:25.873Z

Reserved: 2026-01-08T22:50:32.955Z

Link: CVE-2026-0772

cve-icon Vulnrichment

Updated: 2026-01-23T16:28:54.972Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T04:16:04.333

Modified: 2026-02-18T19:05:00.003

Link: CVE-2026-0772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:00:08Z

Weaknesses