Impact
The vulnerability resides in IBM Langflow Desktop’s FAISS vector store, where an insecure default setting permits an authenticated user to deserialize untrusted pickle data. This flaw enables arbitrary code execution on the host machine, allowing an attacker full control over the system. The weakness is identified as deserialization of untrusted data (CWE‑502), giving the attacker potential damage to confidentiality, integrity, and availability of the entire system.
Affected Systems
IBM Langflow Desktop versions from 1.6.0 through 1.8.2 are affected. Users running any of these releases are susceptible until a patch is applied.
Risk and Exploitability
The CVSS score is 8.8, indicating high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires an authenticated user to supply a malicious pickle file to the FAISS component, which then executes code with application privileges. Because the flaw is a result of a default configuration rather than complex exploitation, the possibility of exploitation is considered high if the vulnerable application is accessible to legitimate users.
OpenCVE Enrichment