AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers can induce requests to the local AgentFlow API to load and execute existing Python pipeline files on disk, resulting in code execution in the context of the user running AgentFlow.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers can induce requests to the local AgentFlow API to load and execute existing Python pipeline files on disk, resulting in code execution in the context of the user running AgentFlow. | |
| Title | AgentFlow Arbitrary Python Pipeline Execution via pipeline_path | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T18:44:07.292Z
Reserved: 2026-04-29T18:30:53.906Z
Link: CVE-2026-7466
No data.
Status : Received
Published: 2026-04-29T19:16:27.013
Modified: 2026-04-29T19:16:27.013
Link: CVE-2026-7466
No data.
OpenCVE Enrichment
Updated: 2026-04-29T21:15:16Z