A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the function CodeParser.parse_callable_details of the file src/lfx/src/lfx/custom/code_parser/code_parser.py of the component Full Builtins Module Handler. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
langflow-ai langflow Full Builtins code_parser.py CodeParser.parse_callable_details command injection
Problem type
Affected products
langflow-ai
1.8.0 - AFFECTED
1.8.1 - AFFECTED
1.8.2 - AFFECTED
1.8.3 - AFFECTED
1.8.4 - AFFECTED
References
https://vuldb.com/vuln/360857
https://vuldb.com/vuln/360857/cti
https://vuldb.com/submit/798731
https://www.yuque.com/yuqueyonghuqy8yu4/ghuay4/ylrgoyyfrucp8opo?singleDoc=#g4kyb
GitHub Security Advisories
GHSA-pprg-5xr3-4qr4
A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the...
https://github.com/advisories/GHSA-pprg-5xr3-4qr4A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the function CodeParser.parse_callable_details of the file src/lfx/src/lfx/custom/code_parser/code_parser.py of the component Full Builtins Module Handler. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
https://nvd.nist.gov/vuln/detail/CVE-2026-7687
https://vuldb.com/submit/798731
https://vuldb.com/vuln/360857
https://vuldb.com/vuln/360857/cti
https://www.yuque.com/yuqueyonghuqy8yu4/ghuay4/ylrgoyyfrucp8opo?singleDoc=#g4kyb
https://github.com/advisories/GHSA-pprg-5xr3-4qr4
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7687Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7687",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-05-03T08:45:14.754Z",
"dateReserved": "2026-05-02T16:06:38.906Z",
"datePublished": "2026-05-03T08:45:14.754Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-05-03T08:45:14.754Z"
},
"title": "langflow-ai langflow Full Builtins code_parser.py CodeParser.parse_callable_details command injection",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in langflow-ai langflow up to 1.8.4. Affected by this issue is the function CodeParser.parse_callable_details of the file src/lfx/src/lfx/custom/code_parser/code_parser.py of the component Full Builtins Module Handler. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "langflow-ai",
"product": "langflow",
"cpes": [
"cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*"
],
"modules": [
"Full Builtins Module Handler"
],
"versions": [
{
"version": "1.8.0",
"status": "affected"
},
{
"version": "1.8.1",
"status": "affected"
},
{
"version": "1.8.2",
"status": "affected"
},
{
"version": "1.8.3",
"status": "affected"
},
{
"version": "1.8.4",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Command Injection",
"cweId": "CWE-77",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/vuln/360857",
"name": "VDB-360857 | langflow-ai langflow Full Builtins code_parser.py CodeParser.parse_callable_details command injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/vuln/360857/cti",
"name": "VDB-360857 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/submit/798731",
"name": "Submit #798731 | langflow-ai langflow 1.8.4 Command Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://www.yuque.com/yuqueyonghuqy8yu4/ghuay4/ylrgoyyfrucp8opo?singleDoc=#g4kyb",
"tags": [
"exploit"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2026-05-02T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-05-02T02:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-05-02T18:11:55.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "limshow (VulDB User)",
"type": "reporter"
},
{
"lang": "en",
"value": "VulDB CNA Team",
"type": "coordinator"
}
]
}
}
}