Description
A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the function CodeParser.parse_callable_details of the file src/lfx/src/lfx/custom/code_parser/code_parser.py of the component Full Builtins Module Handler. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability in the CodeParser.parse_callable_details function of langflow’s Full Builtins module allows an attacker to inject operating system commands. This flaw is a command injection weakness that can lead to remote code execution if an attacker can supply crafted input to the function. The impact is that an attacker could gain control over the host system, compromise confidentiality, integrity, or availability of the affected application.

Affected Systems

The issue affects installations of langflow up to version 1.8.4. The affected product is langflow by langflow‑ai; any deployment running a vulnerable version is at risk.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity. EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog, suggesting it is not widely exploited at this time. Attackers can remotely trigger the vulnerability by sending specially crafted input to the exposed endpoint, potentially bypassing normal authentication if the Full Builtins module is accessible. The CWE identifiers CWE‑74 and CWE‑77 highlight the underlying weaknesses in improper validation of command inputs and lack of safe execution practices.

Generated by OpenCVE AI on May 3, 2026 at 10:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade langflow to a version newer than 1.8.4 once the vendor releases a patch or update containing the fix.
  • If an upgrade is not immediately feasible, disable the Full Builtins module or restrict access to the endpoint that invocates CodeParser.parse_callable_details to prevent external exploitation.
  • Run the application with the least privilege necessary and validate or sanitize any user-supplied input before it reaches the vulnerable function to mitigate the risk of command injection.

Generated by OpenCVE AI on May 3, 2026 at 10:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 03 May 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the function CodeParser.parse_callable_details of the file src/lfx/src/lfx/custom/code_parser/code_parser.py of the component Full Builtins Module Handler. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title langflow-ai langflow Full Builtins code_parser.py CodeParser.parse_callable_details command injection
First Time appeared Langflow
Langflow langflow
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
Vendors & Products Langflow
Langflow langflow
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Langflow Langflow
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-03T08:45:14.754Z

Reserved: 2026-05-02T16:06:38.906Z

Link: CVE-2026-7687

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-03T09:16:03.680

Modified: 2026-05-03T09:16:03.680

Link: CVE-2026-7687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T10:30:15Z

Weaknesses