Two Actively Exploited Flaws Added to CISA Known Vulnerabilities Catalog

CISA adds two actively exploited flaws to its KEV catalog, including a critical Langflow vulnerability exploited by Iranian state hackers and a Trend Micro Apex One directory traversal weakness.

CSBadmin
2 Min Read

Langflow Vulnerability Allows Remote Code Execution

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, confirming evidence of active exploitation in the wild. One of the newly listed flaws affects Langflow, a popular open-source low-code platform for building AI applications. The vulnerability, which carries a critical severity score, stems from an origin validation error. Attackers can exploit this weakness to execute arbitrary code and gain full control over the affected system.

According to research from Obsidian Security, this flaw combines three separate weaknesses: overly permissive Cross Origin Resource Sharing (CORS) settings, a lack of cross site request forgery (CSRF) protection, and a built-in code execution endpoint. Successful exploitation exposes all sensitive access tokens and API keys stored in the workspace, which can lead to cascading compromises across connected cloud and SaaS services. The Iranian state sponsored group MuddyWater has been observed using this vulnerability to gain initial access to target networks.

Trend Micro Apex One Directory Traversal Flaw

The second vulnerability added to the KEV catalog affects on-premise versions of Trend Micro Apex One, a widely used endpoint security solution. This directory traversal flaw allows a pre-authenticated local attacker to modify a key table on the server and inject malicious code that deploys to agents on affected installations. Trend Micro has confirmed at least one instance of active exploitation in the wild.

To exploit this vulnerability, an attacker must already have administrative credentials to the Apex One server obtained through other means. Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary patches by June 4, 2026 to secure their networks. Organizations using either Langflow or on-premise Trend Micro Apex One should prioritize updating their systems immediately to prevent potential compromise.

Source: The Hacker News

CSBadmin

The latest in cybersecurity news and updates.

Share This Article
Follow:
The latest in cybersecurity news and updates.