Cyber Posture

CVE-2026-6543

HighRCE

Published: 30 April 2026

Published
30 April 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 12.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-6543 is a high-severity Code Injection (CWE-94) vulnerability in Ibm (inferred from references). Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and correction of flaws like this command injection vulnerability in Langflow, directly enabling patching as advised by IBM.

prevent

SI-10 mandates input validation at entry points to the Langflow component, directly preventing the code injection (CWE-94) that allows arbitrary command execution.

prevent

AC-6 enforces least privilege for the Langflow process, limiting the impact of arbitrary command execution on sensitive environment variables, files, and internal network access.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Remote code injection vulnerability in network-accessible Langflow component enables arbitrary command execution (T1190: Exploit Public-Facing Application) and directly facilitates command/script execution (T1059: Command and Scripting Interpreter) with access to env vars/creds.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges of the process running Langflow. This allows reading sensitive environment variables (API keys, DB credentials), modifying files, or launching further attacks on the…

more

internal network.

Deeper analysisAI

CVE-2026-6543 affects IBM Langflow Desktop versions 1.0.0 through 1.8.4, where the Langflow component allows an attacker to execute arbitrary commands with the privileges of the running Langflow process. This code injection vulnerability, mapped to CWE-94, enables access to sensitive environment variables including API keys and database credentials. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-04-30T22:16:26.467.

The vulnerability can be exploited by an attacker with low privileges over the network, requiring low attack complexity and no user interaction. Successful exploitation grants high-impact capabilities in confidentiality, integrity, and availability, such as reading sensitive environment variables, modifying files, or launching further attacks on the internal network from the compromised Langflow process.

IBM provides details on mitigation in their security advisory at https://www.ibm.com/support/pages/node/7271092.

Details

CWE(s)

Affected Products

Ibm
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-22906Shared CWE-94
CVE-2025-71281Shared CWE-94
CVE-2024-9132Shared CWE-94
CVE-2024-50658Shared CWE-94
CVE-2026-32525Shared CWE-94
CVE-2024-21760Shared CWE-94
CVE-2025-70830Shared CWE-94
CVE-2024-55028Shared CWE-94
CVE-2025-26936Shared CWE-94
CVE-2024-54756Shared CWE-94

References