Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33475: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langflow-ai langflow

0
Critical
VulnerabilityCVE-2026-33475cvecve-2026-33475cwe-74cwe-78
Published: Tue Mar 24 2026 (03/24/2026, 12:54:33 UTC)
Source: CVE Database V5
Vendor/Project: langflow-ai
Product: langflow

Description

CVE-2026-33475 is a critical unauthenticated remote shell injection vulnerability in the langflow-ai Langflow project prior to version 1. 9. 0. It arises from improper neutralization of special elements in GitHub Actions workflows, where user-controlled GitHub context variables like branch names or pull request titles are directly interpolated into shell commands without sanitization. Attackers can exploit this by crafting malicious branch names or PR titles to inject arbitrary shell commands during CI/CD execution, leading to exfiltration of sensitive secrets such as GITHUB_TOKEN, manipulation of infrastructure, or supply chain compromise. The vulnerability affects multiple workflow files and actions within the Langflow repository. The fix involves refactoring workflows to use environment variables with proper quoting instead of direct interpolation. Given the high CVSS score of 9. 1, this vulnerability poses a severe risk to any public Langflow forks with GitHub Actions enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:28:26 UTC

Technical Analysis

CVE-2026-33475 is a critical shell injection vulnerability identified in the Langflow project, a tool for building AI-powered agents and workflows. The root cause is the improper neutralization of special elements (CWE-74) in GitHub Actions workflows, specifically the direct interpolation of untrusted GitHub context variables such as `${{ github.head_ref }}` or `${{ github.event.pull_request.title }}` inside `run:` steps without sanitization or quoting. Since branch names and pull request titles are user-controlled inputs, malicious actors can create branches or PRs with specially crafted names containing shell commands. When the GitHub Actions workflow runs, these commands are executed in the CI environment. This allows attackers to execute arbitrary shell commands remotely without authentication, leading to potential exfiltration of CI secrets like `GITHUB_TOKEN`, unauthorized infrastructure manipulation, pushing malicious tags or images, tampering with releases, or leaking sensitive data. The vulnerability affects multiple workflow files and actions in Langflow versions prior to 1.9.0, including `.github/actions/install-playwright/action.yml` and various `.github/workflows/*.yml` files. The recommended remediation is to avoid direct interpolation of user-controlled variables in shell commands. Instead, workflows should assign these values to environment variables and use double quotes to ensure proper escaping and prevent injection. The vulnerability has a CVSS v3.1 score of 9.1 (critical), reflecting its ease of exploitation (no authentication or user interaction required), high impact on confidentiality and integrity, and broad scope affecting any public Langflow fork with GitHub Actions enabled. No known exploits in the wild have been reported yet, but the risk is significant given the potential for supply chain compromise.

Potential Impact

The impact of CVE-2026-33475 is severe for organizations using Langflow or its forks with GitHub Actions enabled. Exploitation allows unauthenticated attackers to execute arbitrary shell commands in the CI environment, leading to full compromise of CI secrets such as `GITHUB_TOKEN`. This token often grants permissions to push code, create releases, or access other repository resources, enabling attackers to tamper with the software supply chain by injecting malicious code, pushing compromised artifacts, or altering deployment pipelines. The breach of confidentiality can expose sensitive infrastructure details and credentials. Integrity is compromised as attackers can manipulate build and release processes. Although availability impact is low, the overall effect on trustworthiness and security of the development lifecycle is critical. Organizations relying on Langflow for AI workflows or integrating it into their CI/CD pipelines face risks of supply chain attacks, data leaks, and unauthorized infrastructure access. Public forks and open-source contributors are particularly vulnerable since the attack vector leverages user-controlled inputs like branch names and PR titles. This vulnerability underscores the importance of secure CI/CD practices and input sanitization in automated workflows.

Mitigation Recommendations

To mitigate this vulnerability, organizations and developers should immediately upgrade Langflow to version 1.9.0 or later, where the issue is patched. For existing workflows, refactor GitHub Actions to avoid direct interpolation of user-controlled variables in `run:` shell commands. Instead, assign these variables to environment variables and use double quotes to ensure proper escaping, for example: ```yaml env: BRANCH_NAME: ${{ github.head_ref }} run: | echo "Branch is: \"$BRANCH_NAME\"" ``` Additionally, implement the following best practices: - Validate and sanitize all user inputs, including branch names and PR titles, before usage in workflows. - Restrict permissions of CI tokens like `GITHUB_TOKEN` to the minimum necessary scope. - Monitor GitHub Actions logs and workflow runs for unusual activity or unexpected commands. - Use branch protection rules and require code reviews to reduce risk from malicious branches. - Consider isolating sensitive workflows or secrets from public forks or untrusted contributors. - Regularly audit CI/CD pipelines for injection risks and update dependencies promptly. These steps help prevent injection attacks and protect the integrity of the software supply chain.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c28b09f4197a8e3b35a4bc

Added to database: 3/24/2026, 1:00:57 PM

Last enriched: 3/31/2026, 8:28:26 PM

Last updated: 5/7/2026, 10:32:09 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses