Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. langflow
  4. ›
  5. CVE-2026-0770

CVE-2026-0770: Langflow affected by Remote Code Execution via validate_code() exec()

January 23, 2026 (updated February 19, 2026)

Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Langflow. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of the exec_globals parameter provided to the validate endpoint. The issue results from the inclusion of a resource from an untrusted control sphere. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27325.

References

  • github.com/advisories/GHSA-g22f-v6f7-2hrh
  • github.com/affix/CVE-2026-0770-PoC
  • github.com/langflow-ai/langflow
  • nvd.nist.gov/vuln/detail/CVE-2026-0770
  • www.zerodayinitiative.com/advisories/ZDI-26-036

Code Behaviors & Features

Detect and mitigate CVE-2026-0770 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.7.3

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-829: Inclusion of Functionality from Untrusted Control Sphere

Source file

pypi/langflow/CVE-2026-0770.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 20 Feb 2026 12:20:41 +0000.