Vulnerabilities & CVEs

CISA KEV: Langflow, Trend Micro Apex One Exploits

When government agencies start scrambling to patch specific software vulnerabilities, it’s not just a bureaucratic footnote. It’s a siren song for attackers, signaling a juicy target with a ticking clock.

Illustration of a computer screen displaying lines of code with security icons and warning symbols.

Key Takeaways

  • CISA has added two vulnerabilities (CVE-2025-34291 in Langflow and CVE-2026-34926 in Trend Micro Apex One) to its Known Exploited Vulnerabilities (KEV) list, mandating urgent patching for US federal agencies.
  • The Langflow vulnerability (CVE-2025-34291) has a severe impact, potentially leading to cascading compromises across integrated cloud and SaaS services due to exposed access tokens and API keys, and has been exploited by the Iranian group MuddyWater.
  • The Trend Micro Apex One vulnerability (CVE-2026-34926) requires local, pre-authenticated access with administrative credentials and allows for the injection of malicious code to be deployed to agents, indicating a deepening of existing compromises.

When government agencies start scrambling to patch specific software vulnerabilities, it’s not just a bureaucratic footnote. It’s a siren song for attackers, signaling a juicy target with a ticking clock.

That’s precisely the scenario unfolding with CISA’s recent addition of two critical flaws – one in Langflow and another in Trend Micro’s Apex One – to its Known Exploited Vulnerabilities (KEV) catalog. This isn’t about theoretical risk anymore; this is about active, ongoing attacks that the U.S. government has deemed too dangerous to ignore for its own networks.

The Avalanche Effect of KEV

The KEV list is more than just a watchlist; it’s a mandate. For agencies operating under the Federal Civilian Executive Branch (FCEB), being placed on this list means a hard deadline – in this case, June 4, 2026 – to apply the necessary patches. The clock is ticking, and for those agencies that drag their feet, the consequences could be severe. This immediate pressure fundamentally alters the security posture from proactive defense to reactive necessity.

Langflow: A Chain Reaction of Compromise

Let’s dissect the Langflow vulnerability, CVE-2025-34291. The CVSS score of 9.4 tells you this is bad, but the details reveal just how insidious it is. Obsidian Security’s December 2025 report pointed out a trifecta of weaknesses: overly permissive CORS policies, a lack of Cross-Site Request Forgery (CSRF) protection, and, most damningly, an endpoint that’s practically designed to execute code. This isn’t a subtle backdoor; it’s an open invitation.

The kicker? As Obsidian noted, “The impact is severe: successful exploitation not only compromises the Langflow instance but also exposes all sensitive access tokens and API keys stored within the workspace. This can trigger a cascading compromise across all integrated downstream services in cloud and SaaS environments.” Think of it like finding a master key that not only unlocks your house but also has copies for your car, your office, and your bank vault. The blast radius is enormous.

MuddyWater’s Foothold

And this isn’t just academic. The same vulnerability was apparently wielded by the Iranian hacking group MuddyWater. Their modus operandi, according to Ctrl-Alt-Intel’s March 2026 report, was to use this flaw for initial access. This demonstrates a clear, real-world threat actor actively profiling and exploiting vulnerabilities in widely used developer tools. The thought that a tool designed to streamline complex AI workflows could become a primary vector for nation-state actors is, frankly, chilling.

Trend Micro Apex One: The Local Insider Threat

On the other side of the coin is CVE-2026-34926, affecting Trend Micro’s Apex One. While its CVSS score is a less alarming 6.7, it’s the nature of the exploit that gives pause. This isn’t an external breach; it’s a directory traversal vulnerability that can be exploited by a pre-authenticated local attacker to modify a key table on the server. The ultimate goal? Injecting malicious code that then gets deployed to agents on affected installations. Trend Micro itself confirmed they “observed at least one instance of an attempt to actively exploit one of these vulnerabilities in the wild.”

The crucial caveat here is that an attacker needs server access and administrative credentials already to pull this off. This points to a scenario where an attacker has already gained a significant foothold, and this vulnerability becomes the tool to expand their reach and plant persistent malware across an organization’s managed endpoints. It’s about deepening a compromise, not just initiating it.

Why This Architectural Shift Matters

What’s fascinating, and frankly terrifying, about these specific vulnerabilities is their focus. Langflow is a tool for building and visualizing large language model applications. Its integration into cloud and SaaS environments makes it a linchpin for modern development pipelines. A compromise here isn’t just about a single server; it’s about unraveling complex, interconnected systems. This speaks to a broader architectural shift where the security of the tools building our digital infrastructure is becoming as critical, if not more so, than the security of the infrastructure itself.

Likewise, Apex One is an endpoint security solution. An attacker weaponizing a vulnerability within the very software meant to protect endpoints is a profound betrayal of trust. It’s a sophisticated form of subversion, highlighting how attackers are targeting the control planes of security systems to disarm their targets from within.

The KEV Effect: More Than Just Patches

Being on CISA’s KEV list forces a rapid, almost surgical response. It’s a clear signal that the threat is no longer theoretical or low-priority. For organizations outside the federal mandate, this inclusion still serves as a critical alert. It means these exploits are mature enough, and valuable enough, to be actively weaponized. Ignoring them is like ignoring a smoke alarm that’s already blaring.

This isn’t merely about applying patches; it’s about re-evaluating the security posture around these specific software categories. For Langflow, it means scrutinizing API keys, access tokens, and the security of CI/CD pipelines. For Apex One, it means ensuring the administrative interfaces of security software are locked down tighter than Fort Knox, assuming attackers already have a key.

The addition of these two vulnerabilities to the KEV catalog underscores a disturbing trend: attackers are increasingly targeting the foundational tools and infrastructure that power our digital lives, and cybersecurity agencies are flagging them with unprecedented urgency.


🧬 Related Insights

Daniel Reyes
Written by

Security policy correspondent covering government cyber response, legislation, and national security.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.