{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreihps7borcei3j62cwi4rrbonvvv56kqbyjl6d5e2dhawbge4hsfdi",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mhmfyrbscq22"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreieer5jc3utn7lxanpxhthtgf3nqikeuvwgj7gvjc4dy2ykda4n5ni"
    },
    "mimeType": "image/jpeg",
    "size": 221795
  },
  "path": "/critical-langflow-flaw-was-exploited-within-20-hours-exposing-ai-pipelines-to-unauthenticated-rce/",
  "publishedAt": "2026-03-21T07:36:39.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Critical Langflow flaw was exploited within 20 hours, exposing AI pipelines to unauthenticated RCE",
    "VPN Central"
  ],
  "textContent": "A critical Langflow security flaw is already under active attack, and defenders had very little time to react. Langflow says CVE-2026-33017 allows unauthenticated remote code execution through its public flow build endpoint, while Sysdig says it saw the first real-world exploitation attempts roughly 20 hours after the advisory went live. The bug affects Langflow versions […]\n\nThe post Critical Langflow flaw was exploited within 20 hours, exposing AI pipelines to unauthenticated RCE appeared first on VPN Central.",
  "title": "Critical Langflow flaw was exploited within 20 hours, exposing AI pipelines to unauthenticated RCE"
}