Cyber Posture

CVE-2026-27966

CriticalPublic PoC

Published: 26 February 2026

Published
26 February 2026
Modified
28 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.3567 97.1th percentile
Risk Priority 41 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Python commands and scripts for execution.

Security Summary

CVE-2026-27966 is a critical remote code execution vulnerability in Langflow, an open-source tool for building and deploying AI-powered agents and workflows. In versions prior to 1.8.0, the CSV Agent node hardcodes the `allow_dangerous_code=True` parameter, which automatically exposes LangChain's Python REPL tool (`python_repl_ast`). This flaw, classified under CWE-94 (Code Injection) with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), enables attackers to execute arbitrary Python code and operating system commands on the affected server through prompt injection attacks.

The vulnerability can be exploited by any unauthenticated attacker with network access to the Langflow instance, requiring no privileges, user interaction, or special complexity. Successful exploitation grants full remote code execution (RCE), allowing attackers to run malicious Python scripts or OS commands, potentially leading to complete server compromise, data theft, persistence, or lateral movement within the environment.

The Langflow security advisory (GHSA-3645-fxcv-hqr4) and the fixing commit (d8c6480daa17b2f2af0b5470cdf5c3d28dc9e508) confirm that upgrading to version 1.8.0 resolves the issue by addressing the hardcoded dangerous code allowance in the CSV Agent node.

This vulnerability highlights risks in AI/ML workflow tools like Langflow, where prompt injection can bypass safeguards in agentic systems relying on LangChain components. No public evidence of real-world exploitation has been reported as of the CVE publication on 2026-02-26.

Details

CWE(s)
CWE-94

Affected Products

langflow
langflow
≤ 1.8.0

AI Security Analysis

AI Category
NLP and Transformers
Risk Domain
LLM/Generative AI Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: ai, langchain, prompt injection

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

CVE enables unauthenticated RCE in a public-facing Langflow application (T1190) via prompt injection exposing Python REPL for arbitrary code and OS command execution (T1059.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References