Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37014: n/a

0
High
VulnerabilityCVE-2024-37014cvecve-2024-37014
Published: Mon Jun 10 2024 (06/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37014 is a high-severity remote code execution vulnerability in Langflow versions up to 0. 6. 19. It allows an attacker with at least low privileges to send a specially crafted POST request to the /api/v1/custom_component endpoint containing a malicious Python script, which the system executes. This vulnerability does not require user interaction and can lead to full compromise of confidentiality, integrity, and availability of affected systems. No public exploits are currently known, but the ease of exploitation and impact make it a critical risk for exposed deployments. Organizations using Langflow should prioritize patching or mitigating access to this endpoint to prevent exploitation. The vulnerability is classified under CWE-94, indicating improper control of code injection. Countries with significant adoption of Langflow or related AI workflow tools, especially in North America, Europe, and parts of Asia, are at higher risk. Immediate mitigation should include restricting access to the vulnerable API endpoint and implementing strict input validation or sandboxing of custom components.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:10:20 UTC

Technical Analysis

CVE-2024-37014 is a remote code execution (RCE) vulnerability affecting Langflow through version 0.6.19. The flaw exists because the application allows authenticated users with low privileges to send POST requests to the /api/v1/custom_component endpoint containing arbitrary Python scripts. These scripts are executed by the server without sufficient validation or sandboxing, enabling attackers to run arbitrary code remotely. The vulnerability is classified as CWE-94 (Improper Control of Generation of Code), indicating that user-supplied input is improperly handled and executed as code. The CVSS v3.1 base score is 8.8, reflecting high severity due to network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability poses a significant risk because it can lead to full system compromise, data theft, or service disruption. The lack of available patches at the time of publication means organizations must rely on access controls and other mitigations until updates are released.

Potential Impact

The impact of CVE-2024-37014 is severe for organizations using Langflow, particularly those exposing the vulnerable API endpoint to untrusted or semi-trusted users. Successful exploitation allows attackers to execute arbitrary Python code on the server, potentially leading to complete system takeover, data exfiltration, destruction, or lateral movement within the network. This compromises confidentiality, integrity, and availability of affected systems. Organizations relying on Langflow for AI workflow automation or custom component integration may face operational disruptions, intellectual property theft, and reputational damage. The vulnerability's ease of exploitation and high impact make it a critical threat, especially in environments where Langflow is deployed in production or accessible over the internet. Without prompt mitigation, attackers could leverage this flaw to establish persistent footholds or launch further attacks against connected infrastructure.

Mitigation Recommendations

To mitigate CVE-2024-37014, organizations should immediately restrict access to the /api/v1/custom_component endpoint to trusted users only, ideally limiting it to internal networks or VPNs. Implement strong authentication and authorization controls to ensure only fully trusted administrators can submit custom components. Employ input validation and sanitization to prevent execution of arbitrary code, or disable the ability to upload or execute custom Python scripts if not required. Use application-layer firewalls or API gateways to monitor and block suspicious requests targeting this endpoint. Until official patches are available, consider deploying runtime application self-protection (RASP) or sandboxing techniques to isolate execution of user-supplied scripts. Regularly audit logs for unusual activity related to custom component submissions. Finally, stay updated with Langflow vendor advisories and apply patches promptly once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c66b7ef31ef0b563aa4

Added to database: 2/25/2026, 9:40:54 PM

Last enriched: 2/26/2026, 5:10:20 AM

Last updated: 2/26/2026, 6:11:37 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats