Description
A weakness has been identified in langflow-ai langflow up to 1.8.4. This affects the function eval of the file src/lfx/src/lfx/components/llm_operations/lambda_filter.p of the component LambdaFilterComponent. Executing a manipulation can lead to code injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the eval function of the file src/lfx/src/lfx/components/llm_operations/lambda_filter.p within the Langflow LambdaFilterComponent. An attacker who modifies the input payload can cause the eval operation to execute arbitrary Python code, potentially compromising the hosting system. The flaw is a classic code injection weakness described by CWE-74 and CWE-94, allowing the attacker to inject and run malicious expressions. Consequently, confidentiality, integrity, and availability of the application and any underlying infrastructure can all be jeopardized if the code injection succeeds.

Affected Systems

The affected product is Langflow, developed by langflow-ai, with vulnerable releases up to and including version 1.8.4. Users deploying any version of Langflow <= 1.8.4 are at risk; no information is provided about fixes in later releases.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, yet the public availability of an exploit and the fact that it can be triggered remotely raise the practical risk. The likely attack vector is remote, with an attacker sending carefully crafted payloads to the LambdaFilterComponent over the network. No specific environmental conditions are noted beyond the presence of the vulnerable component.

Generated by OpenCVE AI on May 3, 2026 at 15:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Langflow to a version newer than 1.8.4 where the eval-based injection is removed or hardened.
  • Ensure that the LambdaFilterComponent runs in a restricted execution environment (e.g., sandbox or limited‑privilege container) to mitigate potential damage from injected code.
  • Disable or restrict access to the eval endpoint for untrusted clients, and apply network segmentation or firewall rules to limit exposure of the affected service.

Generated by OpenCVE AI on May 3, 2026 at 15:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 03 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in langflow-ai langflow up to 1.8.4. This affects the function eval of the file src/lfx/src/lfx/components/llm_operations/lambda_filter.p of the component LambdaFilterComponent. Executing a manipulation can lead to code injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title langflow-ai langflow LambdaFilterComponent lambda_filter.p eval code injection
First Time appeared Langflow
Langflow langflow
Weaknesses CWE-74
CWE-94
CPEs cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
Vendors & Products Langflow
Langflow langflow
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Langflow Langflow
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-05T00:43:32.716Z

Reserved: 2026-05-02T20:24:22.085Z

Link: CVE-2026-7700

cve-icon Vulnrichment

Updated: 2026-05-05T00:43:27.414Z

cve-icon NVD

Status : Deferred

Published: 2026-05-03T15:15:59.693

Modified: 2026-05-05T19:11:29.130

Link: CVE-2026-7700

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T21:00:09Z

Weaknesses