Description
IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.
Published: 2026-04-08
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in IBM Langflow Desktop’s FAISS vector store, where an insecure default setting permits an authenticated user to deserialize untrusted pickle data. This flaw enables arbitrary code execution on the host machine, allowing an attacker full control over the system. The weakness is identified as deserialization of untrusted data (CWE‑502), giving the attacker potential damage to confidentiality, integrity, and availability of the entire system.

Affected Systems

IBM Langflow Desktop versions from 1.6.0 through 1.8.2 are affected. Users running any of these releases are susceptible until a patch is applied.

Risk and Exploitability

The CVSS score is 8.8, indicating high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires an authenticated user to supply a malicious pickle file to the FAISS component, which then executes code with application privileges. Because the flaw is a result of a default configuration rather than complex exploitation, the possibility of exploitation is considered high if the vulnerable application is accessible to legitimate users.

Generated by OpenCVE AI on April 8, 2026 at 02:24 UTC.

Remediation

Vendor Solution

IBM recommends addressing the vulnerability now by upgrading to IBM Langflow Desktop 1.8.3 or newer  https://www.langflow.org/blog/langflow-1-8-desktop If you are already using Langflow Desktop, upgrade in the application to version 1.8.3 To install Langflow Desktop for the first time, visit Download Langflow Desktop https://langflow.org/desktop .


OpenCVE Recommended Actions

  • Upgrade IBM Langflow Desktop to version 1.8.3 or newer following the vendor’s instructions.
  • If an immediate upgrade is not possible, disable or restrict the FAISS component’s ability to deserialize untrusted pickle data, or remove any custom vectors that may contain malicious files.
  • Ensure only trusted users have access to the application and that no untrusted data is imported.
  • Regularly check IBM’s security advisories and apply any newer patches promptly.

Generated by OpenCVE AI on April 8, 2026 at 02:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Langflow
Langflow langflow
CPEs cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
Vendors & Products Langflow
Langflow langflow

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
Description IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.
Title IBM Langflow Desktop FAISS Vector Store Remote Code Execution via malicious Pickle file
First Time appeared Ibm
Ibm langflow Desktop
Weaknesses CWE-502
CPEs cpe:2.3:a:ibm:langflow_desktop:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:langflow_desktop:1.8.2:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm langflow Desktop
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Ibm Langflow Desktop
Langflow Langflow
cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-04-08T15:41:55.112Z

Reserved: 2026-02-27T18:17:58.431Z

Link: CVE-2026-3357

cve-icon Vulnrichment

Updated: 2026-04-08T15:41:50.528Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T01:16:41.057

Modified: 2026-04-14T21:28:34.113

Link: CVE-2026-3357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:44:28Z

Weaknesses