MuddyWater Exploits Langflow Flaw for Initial Access
CISA adds CVE-2025-34291 to KEV after Iranian APT MuddyWater weaponizes the CORS/CSRF chain for account takeover and RCE. CVSS 9.4 flaw requires only a malicious link click.
Langflow is back in the spotlight for the wrong reasons. CISA added CVE-2025-34291 to its Known Exploited Vulnerabilities catalog on May 21 after confirming that Iranian state-sponsored group MuddyWater has weaponized the flaw for initial network access operations.
This marks the second critical Langflow vulnerability to see active exploitation in 2026. In March, we covered how attackers exploited CVE-2026-33017 within 20 hours of disclosure to achieve unauthenticated RCE. The new flaw operates differently—it requires user interaction—but the impact is equally severe.
How CVE-2025-34291 Works
CVE-2025-34291 chains three weaknesses into a devastating attack:
- Overly permissive CORS configuration — allows cross-origin requests from any domain
- Missing CSRF protection — no token validation on state-changing requests
- Code execution by design — Langflow's core functionality includes arbitrary code execution for AI workflows
The attack flow is straightforward: an attacker hosts a malicious webpage that makes authenticated requests to a victim's Langflow instance when they visit. Because CORS allows it and CSRF doesn't block it, the attacker can hijack sessions, steal API keys stored in workspaces, and execute arbitrary Python code—all from a single link click.
Obsidian Security researchers who disclosed the vulnerability described it as enabling "complete account takeover and Remote Code Execution simply by having a user visit a malicious webpage." The CVSS score of 9.4 reflects that reality.
MuddyWater Attribution
Iranian APT group MuddyWater (also tracked as Mango Sandstorm, Mercury, and Seedworm) began exploiting CVE-2025-34291 as an initial access vector in early 2026. The group typically targets government, telecommunications, and energy sector organizations across the Middle East, Central Asia, and North Africa.
MuddyWater's operational pattern involves establishing persistent access through stolen credentials and API tokens, then pivoting to deploy custom malware like PowGoop and POWERSTATS for long-term espionage. Langflow deployments in target environments offer a tempting entry point—they often contain API keys and credentials for multiple downstream services.
The involvement of a sophisticated nation-state threat actor elevates this from a theoretical risk to an active campaign with geopolitical implications.
CISA Remediation Deadline
Federal agencies face a June 4, 2026 remediation deadline under Binding Operational Directive 22-01. Private organizations should treat this deadline as guidance—if federal agencies must patch within two weeks, you probably should too.
Immediate Actions
- Upgrade Langflow to the latest patched version immediately
- Rotate all stored secrets — API keys, credentials, and tokens in Langflow workspaces may be compromised
- Review access logs for suspicious session activity or unexpected workflow executions
- Restrict network exposure — Langflow instances should not be directly accessible from the internet without authentication
- Implement CSP headers — proper Content Security Policy can mitigate CSRF attacks as a defense-in-depth measure
Why AI Platforms Keep Getting Hit
This is the second major Langflow vulnerability in three months, and the pattern extends beyond a single vendor. We've covered similar issues in n8n's sandbox escape vulnerability and OpenClaw's credential theft chain. AI workflow platforms combine several high-risk characteristics: they execute arbitrary code by design, they store credentials for downstream services, and they're often deployed quickly to enable experimentation without full security review.
The AI ML security space is experiencing growing pains. Platforms built for rapid prototyping are increasingly deployed in production environments where they become attractive targets. Until vendors mature their security postures and organizations treat AI infrastructure with the same rigor as traditional systems, expect this trend to continue.
For defenders, the lesson is clear: inventory your AI tooling, apply patches aggressively, and assume that threat actors are watching disclosure feeds as closely as you are.
Related Articles
Langflow RCE Exploited Within 20 Hours of Disclosure
CVE-2026-33017 (CVSS 9.3) lets attackers execute arbitrary Python code on Langflow AI pipelines without authentication. Exploitation began before any PoC existed.
Mar 21, 2026Trend Micro Apex One Zero-Day Added to CISA KEV
CVE-2026-34926 lets attackers inject malicious code into Apex One servers and deploy it to all connected endpoint agents. CISA confirms active exploitation with June 4 federal deadline.
May 24, 2026Drupal SQL Injection Now Under Active Attack — 15K Exploits in 48 Hours
CVE-2026-9082 exploitation began within hours of patch release. Imperva tracked 15,000+ attacks against PostgreSQL-backed Drupal sites across 65 countries in the first two days.
May 24, 2026Ollama Flaw Leaks AI Server Memory to Attackers — 300K at Risk
Critical CVE-2026-7482 vulnerability in Ollama's GGUF model loader lets remote attackers extract API keys, prompts, and conversation data from 300,000+ exposed servers.
May 17, 2026