{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T18:34:55.008","vulnerabilities":[{"cve":{"id":"CVE-2026-27966","sourceIdentifier":"security-advisories@github.com","published":"2026-02-26T02:16:23.833","lastModified":"2026-02-28T00:54:27.840","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically exposes LangChain’s Python REPL tool (`python_repl_ast`). As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection, leading to full Remote Code Execution (RCE). Version 1.8.0 fixes the issue."},{"lang":"es","value":"Langflow es una herramienta para construir y desplegar agentes y flujos de trabajo impulsados por IA. Antes de la versión 1.8.0, el nodo CSV Agent en Langflow codifica de forma rígida 'allow_dangerous_code=True', lo que expone automáticamente la herramienta Python REPL de LangChain ('python_repl_ast'). Como resultado, un atacante puede ejecutar comandos arbitrarios de Python y del sistema operativo en el servidor a través de inyección de prompts, lo que lleva a una ejecución remota de código (RCE) completa. La versión 1.8.0 soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.0","matchCriteriaId":"2F2C3DDC-4ECF-4814-AC58-D3D09E54D9B2"}]}]}],"references":[{"url":"https://github.com/langflow-ai/langflow/commit/d8c6480daa17b2f2af0b5470cdf5c3d28dc9e508","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/langflow-ai/langflow/security/advisories/GHSA-3645-fxcv-hqr4","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}