The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert adding two significant, actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The action mandates that Federal Civilian Executive Branch (FCEB) agencies remediate these flaws by a specified deadline. The vulnerabilities are:
CVE-2026-33017: A critical (CVSS 9.3) unauthenticated remote code execution (RCE) vulnerability in Langflow, a popular open-source framework for building AI applications.CVE-2026-33634: An embedded malicious code vulnerability in Aqua Security's Trivy scanner, representing a serious software supply chain compromise.
The rapid exploitation of these flaws, especially the Langflow bug, underscores the speed at which threat actors are weaponizing new disclosures. CISA strongly urges all organizations to prioritize patching.This vulnerability affects Langflow, an open-source UI for building applications with large language models (LLMs). Its popularity (over 145,000 GitHub stars) makes it a widespread and attractive target.
CVE-2026-33017This vulnerability represents a classic software supply chain attack, where a trusted security tool was compromised to distribute malware.
CVE-2026-33634Both vulnerabilities have confirmed evidence of active exploitation in the wild, which is the primary criterion for inclusion in the KEV catalog.
CVE-2026-33017): Exploitation was observed within just 20 hours of its public disclosure, highlighting the extreme speed of modern vulnerability weaponization.CVE-2026-33634): The supply chain compromise is being actively leveraged to distribute malware to unsuspecting users of the security tool.The impact of these two vulnerabilities is significant and broad:
CVE-2026-33017): CVE-2026-33634): Per CISA's Binding Operational Directive (BOD) 22-01, FCEB agencies must patch these vulnerabilities by the specified deadline. CISA strongly recommends all public and private sector organizations do the same.
M1051 - Update Software).The primary mitigation for both vulnerabilities is to update to the patched versions of Langflow and Trivy provided by the developers.
Mapped D3FEND Techniques:
Verifying the digital signature and file hash of software like Trivy before execution can detect supply chain compromises.
Mapped D3FEND Techniques:
For Langflow, restricting network access and placing it behind a WAF can help filter malicious requests attempting to exploit the RCE flaw.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats