On March 25, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-33017, a code injection vulnerability in the Langflow application, to its Known Exploited Vulnerabilities (KEV) catalog. The inclusion in the KEV catalog serves as a definitive confirmation that this vulnerability is being actively exploited by malicious actors in the wild. Langflow is a graphical user interface for building applications with the LangChain framework, which is widely used in AI and large language model (LLM) development. Federal agencies are now mandated to patch this flaw, and CISA strongly urges all public and private sector organizations using Langflow to remediate it immediately to prevent compromise.
Langflow's popularity as a tool for prototyping and building LLM-powered applications means that a successful exploit could give an attacker access to sensitive data, API keys, or the underlying infrastructure used to run the AI models.
The key takeaway from the CISA alert is that CVE-2026-33017 is not a theoretical risk; it is being actively used in attacks. By adding the vulnerability to the KEV catalog, CISA is providing an authoritative warning based on verified intelligence. No details were provided on the threat actors exploiting the flaw or the scale of the attacks.
Organizations using Langflow should immediately check their systems for signs of compromise.
In accordance with Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies have a specific deadline to apply the necessary patch or remediation.
The primary mitigation is to update Langflow to a patched version.
CISA adds CVE-2026-33017 to the Known Exploited Vulnerabilities (KEV) catalog.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.