module
Langflow RCE
| Disclosed | Created |
|---|---|
| Feb 25, 2026 | Apr 23, 2026 |
Disclosed
Feb 25, 2026
Created
Apr 23, 2026
Description
The CSV Agent node in Langflow hardcodes allow_dangerous_code=True, which automatically exposes LangChain's Python REPL tool (python_repl_ast).
As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection, leading to full Remote Code Execution (RCE).
As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection, leading to full Remote Code Execution (RCE).
Authors
weblover12
Takahiro Yokoyama
Takahiro Yokoyama
Platform
Linux,Python,Unix
Architectures
cmd, python
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.