CVE-2026-3357 PUBLISHED

IBM Langflow Desktop FAISS Vector Store Remote Code Execution via malicious Pickle file

Assigner: ibm
Reserved: 27.02.2026 Published: 08.04.2026 Updated: 08.04.2026

IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor IBM
Product Langflow Desktop
Versions
  • affected from 1.6.0 to 1.8.2 (incl.)

Solutions

IBM recommends addressing the vulnerability now by upgrading to IBM Langflow Desktop 1.8.3 or newer  https://www.langflow.org/blog/langflow-1-8-desktop

If you are already using Langflow Desktop, upgrade in the application to version 1.8.3

To install Langflow Desktop for the first time, visit Download Langflow Desktop https://langflow.org/desktop .

Credits

  • This vulnerability was reported to IBM by Weblover. finder

References

Problem Types

  • CWE-502 Deserialization of Untrusted Data CWE