Exhibit A(I): If you self-host Langflow, update now. CVE-2026-33017 is unauthenticated RCE exploited in 20 hours. Attackers harvested API keys from live instances.

If you self-host Langflow, immediate updates are crucial.

Exhibit A(I): If you self-host Langflow, update now. CVE-2026-33017 is unauthenticated RCE exploited in 20 hours. Attackers harvested API keys from live instances.

If you self-host Langflow, immediate updates are crucial. Recently, a remote code execution vulnerability, CVE-2026-33017, was exploited within 20 hours of discovery.

Several instances had their API keys harvested because of this vulnerability. Langflow's public flow endpoint, which passes user-supplied Python directly to exec() without sandboxing, is at the core of the issue.

What to do this week

  1. Update Langflow: Ensure all instances are updated to the latest patched release to prevent exploitation.
  2. Audit Access Logs: Check your logs for unusual activity or API key access that might indicate a breach.
  3. Review API Key Usage: Rotate any API keys that might have been exposed.
  4. Secure the Endpoint: Consider additional layer of security to prevent direct execution of untrusted code.

Sources