A critical vulnerability, CVE-2026-33017, has been identified in Langflow versions prior to 1.9.0. The POST /api/v1/build_public_tmp/{flow_id}/flow endpoint, intended to allow building public flows without authentication, improperly accepts an optional data parameter containing attacker-controlled flow definitions. When supplied, the endpoint uses the provided flow data (which can include arbitrary Python code in node definitions) instead of the stored database flow and passes that code to exec() with no sandboxing, enabling unauthenticated remote code execution. The issue carries a CVSS v4.0 base score of 9.3 and has been fixed in Langflow 1.9.0.
The IONIX research team is tracking ongoing exploitation attempts and recommends immediate patching. Potentially affected assets are outlined in this post.
References:

