CVE-2026-33475: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langflow-ai langflow
CVE-2026-33475 is a critical unauthenticated remote shell injection vulnerability in the langflow-ai Langflow project prior to version 1. 9. 0. It arises from improper neutralization of special elements in GitHub Actions workflows, where user-controlled GitHub context variables like branch names or pull request titles are directly interpolated into shell commands without sanitization. Attackers can exploit this by crafting malicious branch names or PR titles to inject arbitrary shell commands during CI/CD execution, leading to exfiltration of sensitive secrets such as GITHUB_TOKEN, manipulation of infrastructure, or supply chain compromise. The vulnerability affects multiple workflow files and actions within the Langflow repository. The fix involves refactoring workflows to use environment variables with proper quoting instead of direct interpolation. Given the high CVSS score of 9. 1, this vulnerability poses a severe risk to any public Langflow forks with GitHub Actions enabled.
AI Analysis
Technical Summary
CVE-2026-33475 is a critical shell injection vulnerability identified in the Langflow project, a tool for building AI-powered agents and workflows. The root cause is the improper neutralization of special elements (CWE-74) in GitHub Actions workflows, specifically the direct interpolation of untrusted GitHub context variables such as `${{ github.head_ref }}` or `${{ github.event.pull_request.title }}` inside `run:` steps without sanitization or quoting. Since branch names and pull request titles are user-controlled inputs, malicious actors can create branches or PRs with specially crafted names containing shell commands. When the GitHub Actions workflow runs, these commands are executed in the CI environment. This allows attackers to execute arbitrary shell commands remotely without authentication, leading to potential exfiltration of CI secrets like `GITHUB_TOKEN`, unauthorized infrastructure manipulation, pushing malicious tags or images, tampering with releases, or leaking sensitive data. The vulnerability affects multiple workflow files and actions in Langflow versions prior to 1.9.0, including `.github/actions/install-playwright/action.yml` and various `.github/workflows/*.yml` files. The recommended remediation is to avoid direct interpolation of user-controlled variables in shell commands. Instead, workflows should assign these values to environment variables and use double quotes to ensure proper escaping and prevent injection. The vulnerability has a CVSS v3.1 score of 9.1 (critical), reflecting its ease of exploitation (no authentication or user interaction required), high impact on confidentiality and integrity, and broad scope affecting any public Langflow fork with GitHub Actions enabled. No known exploits in the wild have been reported yet, but the risk is significant given the potential for supply chain compromise.
Potential Impact
The impact of CVE-2026-33475 is severe for organizations using Langflow or its forks with GitHub Actions enabled. Exploitation allows unauthenticated attackers to execute arbitrary shell commands in the CI environment, leading to full compromise of CI secrets such as `GITHUB_TOKEN`. This token often grants permissions to push code, create releases, or access other repository resources, enabling attackers to tamper with the software supply chain by injecting malicious code, pushing compromised artifacts, or altering deployment pipelines. The breach of confidentiality can expose sensitive infrastructure details and credentials. Integrity is compromised as attackers can manipulate build and release processes. Although availability impact is low, the overall effect on trustworthiness and security of the development lifecycle is critical. Organizations relying on Langflow for AI workflows or integrating it into their CI/CD pipelines face risks of supply chain attacks, data leaks, and unauthorized infrastructure access. Public forks and open-source contributors are particularly vulnerable since the attack vector leverages user-controlled inputs like branch names and PR titles. This vulnerability underscores the importance of secure CI/CD practices and input sanitization in automated workflows.
Mitigation Recommendations
To mitigate this vulnerability, organizations and developers should immediately upgrade Langflow to version 1.9.0 or later, where the issue is patched. For existing workflows, refactor GitHub Actions to avoid direct interpolation of user-controlled variables in `run:` shell commands. Instead, assign these variables to environment variables and use double quotes to ensure proper escaping, for example: ```yaml env: BRANCH_NAME: ${{ github.head_ref }} run: | echo "Branch is: \"$BRANCH_NAME\"" ``` Additionally, implement the following best practices: - Validate and sanitize all user inputs, including branch names and PR titles, before usage in workflows. - Restrict permissions of CI tokens like `GITHUB_TOKEN` to the minimum necessary scope. - Monitor GitHub Actions logs and workflow runs for unusual activity or unexpected commands. - Use branch protection rules and require code reviews to reduce risk from malicious branches. - Consider isolating sensitive workflows or secrets from public forks or untrusted contributors. - Regularly audit CI/CD pipelines for injection risks and update dependencies promptly. These steps help prevent injection attacks and protect the integrity of the software supply chain.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Netherlands, Australia, Japan, South Korea, India
CVE-2026-33475: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langflow-ai langflow
Description
CVE-2026-33475 is a critical unauthenticated remote shell injection vulnerability in the langflow-ai Langflow project prior to version 1. 9. 0. It arises from improper neutralization of special elements in GitHub Actions workflows, where user-controlled GitHub context variables like branch names or pull request titles are directly interpolated into shell commands without sanitization. Attackers can exploit this by crafting malicious branch names or PR titles to inject arbitrary shell commands during CI/CD execution, leading to exfiltration of sensitive secrets such as GITHUB_TOKEN, manipulation of infrastructure, or supply chain compromise. The vulnerability affects multiple workflow files and actions within the Langflow repository. The fix involves refactoring workflows to use environment variables with proper quoting instead of direct interpolation. Given the high CVSS score of 9. 1, this vulnerability poses a severe risk to any public Langflow forks with GitHub Actions enabled.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33475 is a critical shell injection vulnerability identified in the Langflow project, a tool for building AI-powered agents and workflows. The root cause is the improper neutralization of special elements (CWE-74) in GitHub Actions workflows, specifically the direct interpolation of untrusted GitHub context variables such as `${{ github.head_ref }}` or `${{ github.event.pull_request.title }}` inside `run:` steps without sanitization or quoting. Since branch names and pull request titles are user-controlled inputs, malicious actors can create branches or PRs with specially crafted names containing shell commands. When the GitHub Actions workflow runs, these commands are executed in the CI environment. This allows attackers to execute arbitrary shell commands remotely without authentication, leading to potential exfiltration of CI secrets like `GITHUB_TOKEN`, unauthorized infrastructure manipulation, pushing malicious tags or images, tampering with releases, or leaking sensitive data. The vulnerability affects multiple workflow files and actions in Langflow versions prior to 1.9.0, including `.github/actions/install-playwright/action.yml` and various `.github/workflows/*.yml` files. The recommended remediation is to avoid direct interpolation of user-controlled variables in shell commands. Instead, workflows should assign these values to environment variables and use double quotes to ensure proper escaping and prevent injection. The vulnerability has a CVSS v3.1 score of 9.1 (critical), reflecting its ease of exploitation (no authentication or user interaction required), high impact on confidentiality and integrity, and broad scope affecting any public Langflow fork with GitHub Actions enabled. No known exploits in the wild have been reported yet, but the risk is significant given the potential for supply chain compromise.
Potential Impact
The impact of CVE-2026-33475 is severe for organizations using Langflow or its forks with GitHub Actions enabled. Exploitation allows unauthenticated attackers to execute arbitrary shell commands in the CI environment, leading to full compromise of CI secrets such as `GITHUB_TOKEN`. This token often grants permissions to push code, create releases, or access other repository resources, enabling attackers to tamper with the software supply chain by injecting malicious code, pushing compromised artifacts, or altering deployment pipelines. The breach of confidentiality can expose sensitive infrastructure details and credentials. Integrity is compromised as attackers can manipulate build and release processes. Although availability impact is low, the overall effect on trustworthiness and security of the development lifecycle is critical. Organizations relying on Langflow for AI workflows or integrating it into their CI/CD pipelines face risks of supply chain attacks, data leaks, and unauthorized infrastructure access. Public forks and open-source contributors are particularly vulnerable since the attack vector leverages user-controlled inputs like branch names and PR titles. This vulnerability underscores the importance of secure CI/CD practices and input sanitization in automated workflows.
Mitigation Recommendations
To mitigate this vulnerability, organizations and developers should immediately upgrade Langflow to version 1.9.0 or later, where the issue is patched. For existing workflows, refactor GitHub Actions to avoid direct interpolation of user-controlled variables in `run:` shell commands. Instead, assign these variables to environment variables and use double quotes to ensure proper escaping, for example: ```yaml env: BRANCH_NAME: ${{ github.head_ref }} run: | echo "Branch is: \"$BRANCH_NAME\"" ``` Additionally, implement the following best practices: - Validate and sanitize all user inputs, including branch names and PR titles, before usage in workflows. - Restrict permissions of CI tokens like `GITHUB_TOKEN` to the minimum necessary scope. - Monitor GitHub Actions logs and workflow runs for unusual activity or unexpected commands. - Use branch protection rules and require code reviews to reduce risk from malicious branches. - Consider isolating sensitive workflows or secrets from public forks or untrusted contributors. - Regularly audit CI/CD pipelines for injection risks and update dependencies promptly. These steps help prevent injection attacks and protect the integrity of the software supply chain.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:16:48.969Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c28b09f4197a8e3b35a4bc
Added to database: 3/24/2026, 1:00:57 PM
Last enriched: 3/31/2026, 8:28:26 PM
Last updated: 5/7/2026, 10:32:09 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.