Skip to content

Commit 4ecafea

Browse files
Update KEV: Thu Mar 26 00:21:33 UTC 2026
Signed-off-by: AboutCode Automation <automation@aboutcode.org>
1 parent 264caa1 commit 4ecafea

1 file changed

Lines changed: 21 additions & 4 deletions

File tree

known_exploited_vulnerabilities.json

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,26 @@
11
{
22
"title": "CISA Catalog of Known Exploited Vulnerabilities",
3-
"catalogVersion": "2026.03.20",
4-
"dateReleased": "2026-03-20T15:03:55.6382Z",
5-
"count": 1551,
3+
"catalogVersion": "2026.03.25",
4+
"dateReleased": "2026-03-25T16:56:27.6647Z",
5+
"count": 1552,
66
"vulnerabilities": [
7+
{
8+
"cveID": "CVE-2026-33017",
9+
"vendorProject": "Langflow",
10+
"product": "Langflow",
11+
"vulnerabilityName": "Langflow Code Injection Vulnerability",
12+
"dateAdded": "2026-03-25",
13+
"shortDescription": "Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.",
14+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15+
"dueDate": "2026-04-08",
16+
"knownRansomwareCampaignUse": "Unknown",
17+
"notes": "https:\/\/github.com\/langflow-ai\/langflow\/security\/advisories\/GHSA-vwmf-pq79-vjvx ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-33017",
18+
"cwes": [
19+
"CWE-94",
20+
"CWE-95",
21+
"CWE-306"
22+
]
23+
},
724
{
825
"cveID": "CVE-2025-32432",
926
"vendorProject": "Craft CMS",
@@ -164,7 +181,7 @@
164181
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
165182
"dueDate": "2026-03-27",
166183
"knownRansomwareCampaignUse": "Unknown",
167-
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/chromereleases.googleblog.com\/2026\/03\/stable-channel-update-for-desktop_12.html#:~:text=Google%20is%20aware ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-3909",
184+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/chromereleases.googleblog.com\/2026\/03\/stable-channel-update-for-desktop_13.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-3909",
168185
"cwes": [
169186
"CWE-787"
170187
]

0 commit comments

Comments
 (0)