Impact
The vulnerability resides in the eval function of the file src/lfx/src/lfx/components/llm_operations/lambda_filter.p within the Langflow LambdaFilterComponent. An attacker who modifies the input payload can cause the eval operation to execute arbitrary Python code, potentially compromising the hosting system. The flaw is a classic code injection weakness described by CWE-74 and CWE-94, allowing the attacker to inject and run malicious expressions. Consequently, confidentiality, integrity, and availability of the application and any underlying infrastructure can all be jeopardized if the code injection succeeds.
Affected Systems
The affected product is Langflow, developed by langflow-ai, with vulnerable releases up to and including version 1.8.4. Users deploying any version of Langflow <= 1.8.4 are at risk; no information is provided about fixes in later releases.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, yet the public availability of an exploit and the fact that it can be triggered remotely raise the practical risk. The likely attack vector is remote, with an attacker sending carefully crafted payloads to the LambdaFilterComponent over the network. No specific environmental conditions are noted beyond the presence of the vulnerable component.
OpenCVE Enrichment