A serious security flaw in Langflow has been actively exploited within 20 hours of being made public This article explores security flaw langflow. . This shows how quickly threat actors can use newly discovered vulnerabilities to their advantage.

The security flaw, CVE-2026-33017 (CVSS score: 9.3), is a case of code injection and missing authentication that could let someone run code from a distance. Langflow's advisory for the flaw says, "The POST /api/v1/build_public_tmp/{flow_id}/flow endpoint lets you build public flows without needing to log in." "When the optional data parameter is given, the endpoint uses flow data that the attacker controls (which can include any Python code in node definitions) instead of the flow data that is stored in the database."

This code is sent to exec() without any sandboxing, which lets remote code run without being verified.The vulnerability affects all versions of the open-source artificial intelligence (AI) platform before and including 1.8.1. Rapid7's 2026 Global Threat Landscape Report says that the average time between the discovery of a flaw and its addition to CISA's Known Exploited Vulnerabilities (KEV) catalog went from 8.5 days to five days last year.This compression of the timeline makes things very hard for defenders. It went on to say that the average time it takes for organizations to deploy patches is about 20 days, which means that defenders are open and vulnerable for too long.

"Threat actors are watching the same advisory feeds that defenders use, and they are making exploits faster than most companies can check, test, and deploy patches." To be realistic, businesses need to completely rethink their programs for finding weaknesses. Users should update to the latest patched version as soon as possible.

They should also check the environment variables and secrets on any Langflow instance that is open to the public, change the keys and database passwords as a safety measure, keep an eye out for outbound connections to strange callback services, and limit network access to Langflow instances using firewall rules or a reverse proxy with authentication.