{"id":8188,"date":"2026-05-22T07:11:52","date_gmt":"2026-05-22T07:11:52","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/05\/22\/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev\/"},"modified":"2026-05-22T07:11:52","modified_gmt":"2026-05-22T07:11:52","slug":"cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/05\/22\/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev\/","title":{"rendered":"CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV"},"content":{"rendered":"<p>\u200bThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.<\/p>\n<p>The vulnerabilities in question are listed below &#8211;<\/p>\n<p>  CVE-2025-34291 (CVSS score: 9.4) &#8211; An origin validation error vulnerability in Langflow that could\u00a0The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.<\/p>\n<p>The vulnerabilities in question are listed below &#8211;<\/p>\n<p>  CVE-2025-34291 (CVSS score: 9.4) &#8211; An origin validation error vulnerability in Langflow that could\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerabilities in question are listed below &#8211; CVE-2025-34291 (CVSS score: 9.4) &#8211; An origin validation error vulnerability in Langflow that could\u00a0The&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/05\/22\/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":8189,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/8188"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=8188"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/8188\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/8189"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=8188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=8188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=8188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}