Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-6543— Authenticated Remote Code Execution Vulnerability in Langflow Code Validation Endpoint

CVSS 8.8 · High EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-6543

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Authenticated Remote Code Execution Vulnerability in Langflow Code Validation Endpoint
Source: NVD (National Vulnerability Database)
Vulnerability Description
IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges of the process running Langflow. This allows reading sensitive environment variables (API keys, DB credentials), modifying files, or launching further attacks on the internal network.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
IBM Langflow Desktop 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
IBM Langflow Desktop是美国国际商业机器(IBM)公司的一款AI流程编排桌面应用。 IBM Langflow Desktop 1.0.0至1.8.4版本存在代码注入漏洞,该漏洞源于允许攻击者以运行Langflow进程的权限执行任意命令,可能导致读取敏感环境变量、修改文件或发起进一步攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
IBMLangflow Desktop 1.0.0 ~ 1.8.4 cpe:2.3:a:ibm:langflow_desktop:1.0.0:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-6543

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-6543

登录查看更多情报信息。

Same Patch Batch · IBM · 2026-04-30 · 14 CVEs total

CVE-2026-63898.8 HIGHIBM Turbonomic Prometurbo agent used by IBM Turbonomic Application Resource Management is
CVE-2026-45037.5 HIGHUnauthenticated Insecure Direct Object Reference (IDOR) Vulnerability in Langflow Desktop
CVE-2026-15776.5 MEDIUMIBM® Db2® is vulnerable to a denial of service with a specially crafted query involving mu
CVE-2025-361226.5 MEDIUMIBM® Db2® is vulnerable to a denial of service with a specially crafted query when stmthea
CVE-2026-65426.5 MEDIUMMonitor API allows cross-user read of transaction logs and deletion of build data via flow
CVE-2026-33456.5 MEDIUMPath Traversal and Arbitrary File Write Vulnerability in IBM Langflow Desktop API v2 File
CVE-2026-33406.5 MEDIUMServer-Side Request Forgery (SSRF) in Langflow URL Component
CVE-2026-45026.5 MEDIUMArbitrary File Write and Remote Code Execution Vulnerability in Langflow v2 API
CVE-2026-23116.4 MEDIUMIBM i is affected by a privilege escalation vulnerability in Web Administration GUI []
CVE-2026-33466.4 MEDIUMStored Cross-Site Scripting (XSS) in Langflow Markdown Rendering via rehypeRaw
CVE-2025-363356.2 MEDIUMVulnerabilities found
CVE-2025-146885.3 MEDIUMIBM® Db2® is vulnerable to a denial of service when fetching from certain tables under spe
CVE-2025-361805.3 MEDIUMInadequate Pod Communication Restrictions, affects watsonx.data

IV. Related Vulnerabilities

V. Comments for CVE-2026-6543

No comments yet


Leave a comment