lfx@0.1.9 vulnerabilities

Langflow Executor - A lightweight CLI tool for executing and serving Langflow AI flows

Direct Vulnerabilities

Known vulnerabilities in the lfx package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Eval Injection

lfx is a lfx is a command-line tool for running Langflow workflows. It provides two main commands: serve and run.

Affected versions of this package are vulnerable to Eval Injection via the eval_custom_component_code function. An attacker can execute arbitrary code by supplying a crafted string that is evaluated without proper validation.

How to fix Eval Injection?

There is no fixed version for lfx.

[0,)
  • H
Arbitrary Code Injection

lfx is a lfx is a command-line tool for running Langflow workflows. It provides two main commands: serve and run.

Affected versions of this package are vulnerable to Arbitrary Code Injection via the handling of Python function components. An attacker can execute arbitrary code by introducing custom Python code into a workflow.

How to fix Arbitrary Code Injection?

There is no fixed version for lfx.

[0,)
  • H
Unsafe Dependency Resolution

lfx is a lfx is a command-line tool for running Langflow workflows. It provides two main commands: serve and run.

Affected versions of this package are vulnerable to Unsafe Dependency Resolution via the exec_globals parameter in the validate endpoint. An attacker can execute arbitrary code by supplying crafted input to this parameter.

How to fix Unsafe Dependency Resolution?

There is no fixed version for lfx.

[0,)
  • C
Arbitrary Code Injection

lfx is a lfx is a command-line tool for running Langflow workflows. It provides two main commands: serve and run.

Affected versions of this package are vulnerable to Arbitrary Code Injection via the code parameter in the validate endpoint. An attacker can execute arbitrary code with root privileges by sending a specially crafted request containing malicious Python code.

How to fix Arbitrary Code Injection?

There is no fixed version for lfx.

[0,)