Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»New Langflow flaw actively exploited to hijack AI workflows
    Cybersecurity

    New Langflow flaw actively exploited to hijack AI workflows

    adminBy adminMarch 27, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA: New Langflow flaw actively exploited to hijack AI workflows
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CISA: New Langflow flaw actively exploited to hijack AI workflows

    The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents.

    The security issue received a critical score of 9.3 out of 10 and can be leveraged for remote code execution, allowing threat actors to build public flows without authentication.

    The agency added the issue to the list of Known Exploited Vulnerabilities, describing it as a code injection vulnerability.

    Researchers at application security company Endor Labs claim that hackers started exploiting CVE-2026-33017 on March 19, about 20 hours after the vulnerability advisory became public.

    No public proof-of-concept (PoC) exploit code existed at the time, and Endor Labs believes that attackers built exploits directly from the information included in the advisory.

    Automated scanning activity began in 20 hours, followed by exploitation using Python scripts in 21 hours, and data (.env and .db files) harvesting in 24 hours.

    Langflow is a popular open-source visual framework for building AI workflows with 145,000 stars on GitHub. It provides a drag-and-drop interface for connecting nodes into executable pipelines, along with a REST API for running them programmatically.

    The tool has widespread adoption across the AI development ecosystem, making it an attractive target for hackers.

    In May 2025, CISA issued another warning about active exploitation in Langflow, targeting CVE-2025-3248, a critical API endpoint flaw that allows unauthenticated RCE and potentially leads to full server control.

    The most recent flaw, CVE-2026-33017, lets attackers execute arbitrary Python code impacts versions 1.8.1 and earlier of Langflow, and could be exploited via a single crafted HTTP request due to unsandboxed flow execution.

    CISA did not mark the flaw as exploited by ransomware actors, but gave federal agencies until April 8 to apply the security updates or mitigations, or stop using the product.

    System administrators are recommended to upgrade to Langflow version 1.9.0 or later, which addresses the security problem, or disable/restrict the vulnerable endpoint.

    Endor Labs also advised not to expose Langflow directly to the internet, to monitor outbound traffic, and to rotate API keys, database credentials, and cloud secrets when suspicious activity is detected.

    CISA’s deadline formally applies to organizations covered by Binding Operational Directive (BOD) 22-01, but private sector companies, state and local governments, and other non-FCEB entities are also advised to treat it as a benchmark and respond accordingly.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    Actively Exploited Flaw Hijack Langflow workflows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle PMax gets new exclusions, expanded reporting features
    Next Article AI’s need for speed, optical connectivity in focus at OFC 2026
    admin
    • Website

    Related Posts

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    How to Use Google Ads Brand Guidelines for Cleaner Automated Assets

    April 16, 2026

    Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,347)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (828)
    • Tech Tools & Mobile / Apps (1,612)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026

    How to Use Google Ads Brand Guidelines for Cleaner Automated Assets

    April 16, 2026
    Most Popular
    • ChatGPT Often Retrieves But Rarely Cites Reddit Pages, Data Shows
    • Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face
    • How to Use Google Ads Brand Guidelines for Cleaner Automated Assets
    • Dragon City: Mobile Adventure 26.5.0 APK Download by Social Point
    • OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    • I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell
    • IBM unveils security services for thwarting agentic attacks, automating threat assessment
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.