CISA Sounds Alarm on Langflow RCE & Trivy Supply Chain Compromise, title: Langflow RCE, Trivy vulnerability, supply chain attack
Urgent Warning from CISA Regarding Newly Identified Vulnerabilities
The United States’ Cybersecurity and Infrastructure Security Agency (CISA) has recently issued an urgent warning about two newly discovered vulnerabilities: CVE-2026-33017 and CVE-2026-33634. These vulnerabilities are now included in the CISA Known Exploited Vulnerabilities catalog, necessitating that federal civilian agencies take action within specific timeframes.
CVE-2026-33634: Supply Chain Compromise Involving Trivy Scanner
A second vulnerability, CVE-2026-33634, involves a supply chain compromise related to the Trivy security scanner. On March 19, 2026, attackers associated with TeamPCP forced-push a malicious Trivy v0.69.4 release, changed version tags in aquasecurity/trivy-action to credential-stealing malware, altered all tags in aquasecurity/setup-trivy with malicious commits, and pushed out malicious trivy images on Docker Hub. This attack may have contributed to the LiteLLM supply chain attack, leading to compromised LiteLLM packages being published on PyPI. Aqua Security has provided guidance for affected users and developers.
Aqua Security has released remediation instructions for impacted users and developers. The German Federal Office for Information Security (BSI) has reported a number of compromises related to the Trivy attack, stating that no data is believed to have been extracted during this incident.
