Langflow CVE-2026-33017 Exploited in the Wild — Attackers Steal AWS Keys, Deploy NATS Botnet

AI relevance: Langflow is an open-source AI workflow builder used to construct RAG pipelines and agent toolchains; active exploitation of its unauthenticated RCE demonstrates how exposed AI infrastructure tools are being weaponized for cloud credential theft and botnet recruitment.

What happened

  • Attackers are actively exploiting CVE-2026-33017, an unauthenticated remote code execution flaw in Langflow that was added to the CISA Known Exploited Vulnerabilities catalog in March 2026.
  • The vulnerability allows attackers to run commands directly in the Langflow container by hitting a public endpoint with no authentication required.
  • In analyzed incidents, this single step was sufficient to dump environment variables containing live AWS access keys.
  • Stolen AWS credentials were then used for broader cloud reconnaissance and abuse, including deploying a NATS-based botnet worker.
  • The attack chain demonstrates how a single exposed AI workflow tool can cascade into full cloud compromise.

Why it matters

Langflow deployments are commonly internet-facing because they serve as UI frontends for building and managing AI workflows. When deployed with cloud credentials in environment variables (a common pattern for accessing AWS Bedrock, S3-based vector stores, or SageMaker), an unauthenticated RCE gives attackers direct access to the organization's cloud infrastructure. The use of NATS — a lightweight messaging system — as a botnet command-and-control channel suggests the attackers are building a distributed cloud abuse network, potentially for crypto mining, proxy infrastructure, or further supply-chain operations.

What to do

  • Patch Langflow immediately to a version that fixes CVE-2026-33017 — this is in the CISA KEV catalog, meaning active exploitation is confirmed.
  • Never expose Langflow to the internet without authentication. Use network-level access controls or a reverse proxy with auth.
  • Rotate AWS credentials on any Langflow deployment that was internet-accessible before patching.
  • Audit cloud activity: Check CloudTrail for unusual API calls from Langflow-associated IAM roles, particularly NATS deployments or unfamiliar EC2/Lambda resources.
  • Remove credentials from environment variables: Use IAM roles or secrets managers instead of plaintext env vars for AI tool cloud access.

Sources