Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Critical Langflow Flaw Exposed: Hackers Hijacking AI Workflows in Record Time



CISA Warns of Critical Langflow Flaw: AI Workflows Hijacked by Hackers in Under 24 Hours
A recent vulnerability in the popular open-source visual framework Langflow has been actively exploited by hackers, allowing them to hijack AI workflows and potentially gain control over critical systems. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning and advised organizations to take immediate action to patch the issue.


  • Hackers have exploited a critical vulnerability in Langflow, a widely used open-source visual framework for AI workflows.
  • The issue, CVE-2026-33017, allows attackers to execute arbitrary Python code and has been rated at 9.3 out of 10 in severity.
  • Hackers have started exploiting the vulnerability just 20 hours after the advisory was released, demonstrating speed and sophistication.
  • CISA has urged federal agencies to patch or stop using Langflow until further notice, recommending upgrades or disabling the vulnerable endpoint.
  • Users are advised to monitor outbound traffic for suspicious activity, rotate API keys and credentials, and restrict exposure to the internet.


  • The world of artificial intelligence and machine learning is facing a new threat, courtesy of a critical vulnerability in the widely used open-source visual framework Langflow. According to recent reports, hackers have been actively exploiting this flaw to hijack AI workflows, potentially allowing them to gain control over critical systems.
    The Langflow framework, which boasts 145,000 stars on GitHub, is designed to provide a drag-and-drop interface for connecting nodes into executable pipelines, along with a REST API for running them programmatically. Its widespread adoption across the AI development ecosystem has made it an attractive target for hackers.

    In May 2025, CISA issued a warning about active exploitation in Langflow, targeting CVE-2025-3248, a critical API endpoint flaw that allows unauthenticated remote code execution and potentially leads to full server control. However, this time around, the issue is more nuanced.

    CVE-2026-33017, another critical vulnerability identified by the agency, affects versions 1.8.1 and earlier of Langflow. This flaw can be exploited via a single crafted HTTP request due to unsandboxed flow execution, allowing attackers to execute arbitrary Python code. The severity of this issue has been rated at 9.3 out of 10.

    What's even more alarming is that hackers have started exploiting CVE-2026-33017 just 20 hours after the vulnerability advisory became public. Researchers at application security company Endor Labs claim that attackers built exploits directly from the information included in the advisory, highlighting the speed and sophistication of modern-day hacking.

    Automated scanning activity began as early as 20 hours after the advisory was released, followed by exploitation using Python scripts within 21 hours, and data (.env and .db files) harvesting in 24 hours. This demonstrates a level of efficiency and coordination that is both concerning and characteristic of modern threat actors.

    Langflow's widespread adoption has made it an attractive target for hackers, who are able to exploit this vulnerability to gain control over AI workflows. The impact of such an attack could be far-reaching, potentially affecting critical systems, infrastructure, and even national security.

    In response to this issue, CISA has urged federal agencies to take immediate action to patch the issue or stop using the product until further notice. System administrators are advised to upgrade to Langflow version 1.9.0 or later, which addresses the security problem, or disable/restrict the vulnerable endpoint.

    Additionally, Endor Labs recommends that users not expose Langflow directly to the internet and to monitor outbound traffic for suspicious activity. They also suggest rotating API keys, database credentials, and cloud secrets when potential threats are detected.

    This incident serves as a stark reminder of the importance of vigilance in the world of cybersecurity. As AI technologies become increasingly integrated into our daily lives, it's essential that we prioritize security measures to prevent similar incidents from occurring in the future.

    Furthermore, this highlights the need for continued collaboration between organizations and regulatory bodies to stay ahead of emerging threats. By working together, we can create a safer digital landscape for everyone.

    The recent exposure of CVE-2026-33017 demonstrates the ever-evolving nature of cybersecurity threats. As AI technologies continue to advance at an unprecedented rate, so too must our response to these threats.

    Stay informed, stay vigilant, and stay ahead of the curve in this rapidly changing world of cybersecurity.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/Critical-Langflow-Flaw-Exposed-Hackers-Hijacking-AI-Workflows-in-Record-Time-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/

  • https://labs.cloudsecurityalliance.org/research/csa-research-note-cve-2026-33017-langflow-ai-pipeline-rce-20/


  • Published: Thu Mar 26 15:37:18 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us