CVE-2026-6543 PUBLISHED

Authenticated Remote Code Execution Vulnerability in Langflow Code Validation Endpoint

Assigner: ibm
Reserved: 17.04.2026 Published: 30.04.2026 Updated: 30.04.2026

IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges of the process running Langflow. This allows reading sensitive environment variables (API keys, DB credentials), modifying files, or launching further attacks on the internal network.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor IBM
Product Langflow Desktop
Versions
  • affected from 1.0.0 to 1.8.4 (incl.)

Solutions

IBM recommends addressing the vulnerability now by upgrading to IBM Langflow Desktop 1.9.0 or newer https://www.langflow.org/blog/langflow-1-8-desktopIf you are already using Langflow Desktop, upgrade in the application to version 1.9.0To install Langflow Desktop for the first time, visit Download Langflow Desktop.

Credits

  • Eran Shimony (Palo Alto Networks) finder

References

Problem Types

  • CWE-94 Improper Control of Generation of Code ('Code Injection') CWE