Impact
A vulnerability in the CodeParser.parse_callable_details function of langflow’s Full Builtins module allows an attacker to inject operating system commands. This flaw is a command injection weakness that can lead to remote code execution if an attacker can supply crafted input to the function. The impact is that an attacker could gain control over the host system, compromise confidentiality, integrity, or availability of the affected application.
Affected Systems
The issue affects installations of langflow up to version 1.8.4. The affected product is langflow by langflow‑ai; any deployment running a vulnerable version is at risk.
Risk and Exploitability
The CVSS base score of 5.3 indicates moderate severity. EPSS is not available and the vulnerability is not listed in CISA’s KEV catalog, suggesting it is not widely exploited at this time. Attackers can remotely trigger the vulnerability by sending specially crafted input to the exposed endpoint, potentially bypassing normal authentication if the Full Builtins module is accessible. The CWE identifiers CWE‑74 and CWE‑77 highlight the underlying weaknesses in improper validation of command inputs and lack of safe execution practices.
OpenCVE Enrichment