No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 03 May 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the function CodeParser.parse_callable_details of the file src/lfx/src/lfx/custom/code_parser/code_parser.py of the component Full Builtins Module Handler. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | langflow-ai langflow Full Builtins code_parser.py CodeParser.parse_callable_details command injection | |
| First Time appeared |
Langflow
Langflow langflow |
|
| Weaknesses | CWE-74 CWE-77 |
|
| CPEs | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Langflow
Langflow langflow |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-03T08:45:14.754Z
Reserved: 2026-05-02T16:06:38.906Z
Link: CVE-2026-7687
No data.
Status : Received
Published: 2026-05-03T09:16:03.680
Modified: 2026-05-03T09:16:03.680
Link: CVE-2026-7687
No data.
OpenCVE Enrichment
Updated: 2026-05-03T10:30:15Z