Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation
    Cybersecurity

    CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation

    adminBy adminMarch 27, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The US Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its Known Exploited Vulnerabilities catalog:

    • CVE-2026-33017, a recently disclosed code injection vulnerability in Langflow, an open-source framework for building AI agents and workflows, and
    • CVE-2026-33634, an embedded malicious code vulnerability in Aqua Security’s Trivy security scanner.

    Their addition to the catalog means that US federal civilian agencies are required to address the flaws within their networks by April 8 and 9, respectively.

    About CVE-2026-33017

    CVE-2026-33017 is a critical vulnerability stemming from several security weaknesses and affects Langflow versions 1.8.2. and earlier. It may allow unauthenticated attackers to remotely execute code on a Langflow instance via a public flow build endpoint.

    A very detailed security advisory for CVE-2026-33017 was made broadly visible on GitHub on March 17, 2026, and apparently had enough information for attackers to develop an exploit and start using it.

    “Within 20 hours of the advisory’s publication, the Sysdig Threat Research Team (TRT) observed the first exploitation attempts in the wild,” the cloud security company shared.

    “No public proof-of-concept (PoC) code existed at the time. Attackers built working exploits directly from the advisory description and began scanning the internet for vulnerable instances. Exfiltrated information included keys and credentials, which provided access to connected databases and potential software supply chain compromise.”

    The occurrence serves as another confirmation of the shrinking window between “advisory publication” and “active exploitation”, Sysdig researchers noted.

    “The collapse from months-long exploitation timelines to same-day weaponization is a structural shift in how vulnerabilities are exploited today. Organizations that rely on scheduled patch cycles to address critical vulnerabilities are operating on a timeline that attackers have already outpaced. Runtime detection, network segmentation, and rapid response capabilities are essential to bridging the gap between disclosure and remediation.”

    It should be pointed out that Aviral Srivastava, the discoverer of CVE-2026-33017, unearthed the flaw while checking out how Langflow maintainers fixed CVE-2025–3248, a previously exploited vulnerability in the same code base.

    This allowed him to pinpoint the same class of vulnerability, but on a different endpoint. It’s therefore also possible (though less likely) that attackers followed a similar approach.

    About CVE-2026-33634

    The CVE-2026-33634 identifier has been assigned to allow security teams to follow the ramifications of the Trivy supply chain compromise.

    This compromise, which has been attributed to TeamPCP, happened on March 19, 2026, and allowed attackers to:

    • Publish a malicious Trivy v0.69.4 release
    • Force-push version tags in ‘aquasecurity/trivy-action’ to credential-stealing malware
    • Replace all tags in ‘aquasecurity/setup-trivy’ with malicious commits
    • Push out malicious trivy images on Docker Hub.

    It also likely led to the LiteLLM supply chain attack, which resulted in compromised LiteLLM packages being published on PyPI.

    Aqua Security outlined the incident and advised on recommended action for those that have been affected, and is expected to provide a meaningful update on their investigation in the coming days.

    BerriAI, the creators of LiteLLM, have paused the release of new LiteLLM packages, and they’ve called in Mandiant to do a complete supply chain security review. According to Wiz researchers, LiteLLM is present in 36% of cloud environments they monitor, “signifying the potential for widespread impact.”

    Both organizations have provided remediation instructions for affected users and developers.

    In a public alert, the German Federal Office for Information Security (BSI) said that a number of compromises were reported them in the wake of and related to the Trivy attack. “According to current information, no data is believed to have been exfiltrated,” they said.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    alarm Chain CISA Compromise exploitation Langflow rapid RCE sounds Supply Trivy
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to Add a WooCommerce Cart Reserved Timer
    Next Article Listen to this! The Nothing Ear (a) earbuds have dropped to only $59 during Amazon’s Big Spring Sale
    admin
    • Website

    Related Posts

    Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed

    April 18, 2026

    Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

    April 18, 2026

    How Threat Actors Vet Stolen Credit Card Shops

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed

    April 18, 2026

    Why bottom-of-funnel content is winning in AI search

    April 18, 2026

    Missed your shot at a Galaxy Z TriFold? A successor could be in the works with a new hinge

    April 18, 2026

    This Compact HP Mini Desktop Is on Sale for Just $320 Right Now

    April 18, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,379)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (845)
    • Tech Tools & Mobile / Apps (1,647)
    • WiFi / Internet & Networking (231)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed

    April 18, 2026

    Why bottom-of-funnel content is winning in AI search

    April 18, 2026

    Missed your shot at a Galaxy Z TriFold? A successor could be in the works with a new hinge

    April 18, 2026
    Most Popular
    • Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed
    • Why bottom-of-funnel content is winning in AI search
    • Missed your shot at a Galaxy Z TriFold? A successor could be in the works with a new hinge
    • This Compact HP Mini Desktop Is on Sale for Just $320 Right Now
    • Data centers are costing local governments billions
    • Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
    • This open-source smart home system is slowly overtaking Alexa and Google Home
    • I asked ChatGPT to find me a free movie and didn’t expect this
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.