Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2897 articles · 109737 vulns · 38/41 feeds (7d)
← Back to list
8.8
CVE-2026-3357EXPLOITEDPATCHED
ibm · langflow

IBM Langflow Desktop FAISS Vector Store Remote Code Execution via malicious Pickle file

Description

IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.

Affected Products

VendorProductVersions
ibmlangflow1.6.0

References

  • https://www.ibm.com/support/pages/node/7268428(vendor-advisory, patch)

Related News (1 articles)

Tier C
VulDB2d ago
CVE-2026-3357 | IBM Langflow Desktop up to 1.8.2 deserialization
→ No new info (linked only)
CVSS 3.18.8 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
https://www.ibm.com/support/pages/node/7268428
CWECWE-502
PublishedApr 8, 2026
Last enriched2d agov2
Trending Score35
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-1343EXP
Security Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Verify Access
Trending: 39
HIGHPRE-CVEEXP
Multiple vulnerabilities in IBM App Connect Enterprise allowing data manipulation and denial of service
Trending: 34
CRITICALCVE-2026-1346
Security Vulnerabilities have been found in IBM Verify Identity Access and IBM Security Verify Access
Trending: 25
MEDIUMCVE-2025-13333
IBM WebSphere Application Server 9.0, and 8.5 could provide weaker than expected security during system administration of security settings.
Trending: 23
HIGHCVE-2026-4788
Multiple Vulnerabilities affect IBM Tivoli Netcool Impact
Trending: 23

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 8, 2026
Discovered by ZDM
Apr 8, 2026
Updated: severity, activelyExploited
Apr 8, 2026
Actively Exploited
Apr 8, 2026
Patch Available
Apr 8, 2026

Version History

v2
Last enriched 2d ago
v2Tier C2d ago

Updated severity to CRITICAL, marked exploit as not available, and noted that the vulnerability is actively exploited.

severityactivelyExploited
via VulDB
v12d ago

Initial creation