CISA: New Langflow flaw actively exploited to hijack AI workflows
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是CISA警告黑客正在利用Langflow框架中的一个关键漏洞CVE-2026-33017。这个漏洞评分很高,9.3分,属于严重级别,可以被用来进行远程代码执行。Endor Labs的研究人员指出,黑客在漏洞公告公开后不到一天就开始利用这个漏洞了。Langflow是一个流行的开源AI开发框架,在GitHub上有14万颗星,所以它被广泛使用,自然成为黑客的目标。 接下来,CISA建议用户升级到1.9.0或更高版本,并采取其他安全措施。此外,Endor Labs还建议不要将Langflow直接暴露在互联网上,并监控外传流量等。 现在要将这些信息浓缩到100字以内。需要涵盖的关键点包括:CISA警告、漏洞名称、评分、影响、攻击方式、利用时间、Langflow的流行度和重要性、建议的补救措施。 可能的结构是:CISA警告黑客利用Langflow框架中的关键漏洞CVE-2026-33017(评分9.3),该漏洞允许远程代码执行。研究人员发现攻击在公告后20小时内开始。Langflow广泛用于AI开发,建议升级版本或限制易受攻击的端点。 这样大概在100字左右。 </think> CISA警告黑客正利用Langflow框架中的关键漏洞CVE-2026-33017(评分9.3),该漏洞允许远程代码执行。研究人员发现攻击在公告后20小时内开始。Langflow广泛用于AI开发,建议升级至1.9.0或限制易受攻击的端点。 2026-3-26 19:30:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

CISA: New Langflow flaw actively exploited to hijack AI workflows

The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents.

The security issue received a critical score of 9.3 out of 10 and can be leveraged for remote code execution, allowing threat actors to build public flows without authentication.

The agency added the issue to the list of Known Exploited Vulnerabilities, describing it as a code injection vulnerability.

Researchers at application security company Endor Labs claim that hackers started exploiting CVE-2026-33017 on March 19, about 20 hours after the vulnerability advisory became public.

No public proof-of-concept (PoC) exploit code existed at the time, and Endor Labs believes that attackers built exploits directly from the information included in the advisory.

Automated scanning activity began in 20 hours, followed by exploitation using Python scripts in 21 hours, and data (.env and .db files) harvesting in 24 hours.

Langflow is a popular open-source visual framework for building AI workflows with 145,000 stars on GitHub. It provides a drag-and-drop interface for connecting nodes into executable pipelines, along with a REST API for running them programmatically.

The tool has widespread adoption across the AI development ecosystem, making it an attractive target for hackers.

In May 2025, CISA issued another warning about active exploitation in Langflow, targeting CVE-2025-3248, a critical API endpoint flaw that allows unauthenticated RCE and potentially leads to full server control.

The most recent flaw, CVE-2026-33017, lets attackers execute arbitrary Python code impacts versions 1.8.1 and earlier of Langflow, and could be exploited via a single crafted HTTP request due to unsandboxed flow execution.

CISA did not mark the flaw as exploited by ransomware actors, but gave federal agencies until April 8 to apply the security updates or mitigations, or stop using the product.

System administrators are recommended to upgrade to Langflow version 1.9.0 or later, which addresses the security problem, or disable/restrict the vulnerable endpoint.

Endor Labs also advised not to expose Langflow directly to the internet, to monitor outbound traffic, and to rotate API keys, database credentials, and cloud secrets when suspicious activity is detected.

CISA’s deadline formally applies to organizations covered by Binding Operational Directive (BOD) 22-01, but private sector companies, state and local governments, and other non-FCEB entities are also advised to treat it as a benchmark and respond accordingly.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/
如有侵权请联系:admin#unsafe.sh