CVE-2026-0772

7.5 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to execute arbitrary code on Langflow installations by exploiting insecure deserialization in the disk cache service. Attackers can leverage this to run commands with the service account's privileges. Only Langflow installations with the vulnerable disk cache service are affected.

💻 Affected Systems

Products:
  • Langflow
Versions: Versions prior to patch
Operating Systems: All platforms running Langflow
Default Config Vulnerable: ⚠️ Yes
Notes: Requires disk cache service to be enabled and accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code with service account privileges, potentially leading to data theft, lateral movement, or complete system takeover.

🟠

Likely Case

Authenticated attackers gaining remote code execution on vulnerable Langflow instances, enabling data exfiltration, installation of backdoors, or service disruption.

🟢

If Mitigated

Limited impact due to proper network segmentation, authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Authentication is required, but once authenticated, exploitation is relatively straightforward for attackers familiar with deserialization attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-26-038/

Restart Required: Yes

Instructions:

1. Check current Langflow version
2. Apply vendor-provided patch or update to fixed version
3. Restart Langflow services
4. Verify patch application

🔧 Temporary Workarounds

Disable disk cache service

all

Temporarily disable the vulnerable disk cache component if not essential

Check Langflow configuration for disk cache settings and disable

Restrict network access

all

Limit access to Langflow services to trusted networks only

Configure firewall rules to restrict Langflow port access

🧯 If You Can't Patch

  • Implement strict authentication controls and monitor for suspicious activity
  • Isolate vulnerable systems in segmented network zones with limited access

🔍 How to Verify

Check if Vulnerable:

Check Langflow version against vendor advisory and verify disk cache service is enabled

Check Version:

langflow --version or check Langflow configuration/interface

Verify Fix Applied:

Verify Langflow version is updated to patched version and test deserialization attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual deserialization attempts in Langflow logs
  • Suspicious process execution from Langflow service account
  • Authentication logs showing successful logins followed by cache manipulation

Network Indicators:

  • Unusual outbound connections from Langflow service
  • Suspicious payloads sent to Langflow disk cache endpoints

SIEM Query:

source="langflow.log" AND ("deserialization" OR "cache" OR "untrusted data")

🔗 References

📤 Share & Export