On March 25, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-33017, a code injection vulnerability in the Langflow application, to its Known Exploited Vulnerabilities (KEV) catalog. The inclusion in the KEV catalog serves as a definitive confirmation that this vulnerability is being actively exploited by malicious actors in the wild. Langflow is a graphical user interface for building applications with the LangChain framework, which is widely used in AI and large language model (LLM) development. Federal agencies are now mandated to patch this flaw, and CISA strongly urges all public and private sector organizations using Langflow to remediate it immediately to prevent compromise.
Langflow's popularity as a tool for prototyping and building LLM-powered applications means that a successful exploit could give an attacker access to sensitive data, API keys, or the underlying infrastructure used to run the AI models.
The key takeaway from the CISA alert is that CVE-2026-33017 is not a theoretical risk; it is being actively used in attacks. By adding the vulnerability to the KEV catalog, CISA is providing an authoritative warning based on verified intelligence. No details were provided on the threat actors exploiting the flaw or the scale of the attacks.
Organizations using Langflow should immediately check their systems for signs of compromise.
In accordance with Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies have a specific deadline to apply the necessary patch or remediation.
The primary mitigation is to update Langflow to a patched version.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats