0.904
EPSS

CVE-2025-3248

CVSSv4: NA | CVSSv3: 9.8 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.90412 | KEV: Exploitation Reported
Published: 07/04/2025 Updated: 08/04/2025

Vulnerability Summary

Code Injection Vulnerability in Langflow Versions Prior to 1.3.0

Langflow versions before 1.3.0 have a code injection vulnerability in the /api/v1/validate/code endpoint. This security issue allows a remote and unauthenticated attacker to send specially crafted HTTP requests that can execute arbitrary code on the system. The vulnerability poses a significant risk as it enables potential unauthorized code execution without requiring any prior authentication.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

langflow-ai langflow

Github Repositories

POC of CVE-2025-3248

CVE-2025-3248-POC POC of CVE-2025-3248 usage: python pocpy 'xxxcom' 'ls /' leave some love on victims' computers pocpy

A vulnerability scanner for CVE-2025-3248 in Langflow applications.

中文 | English Langflow Vulnerability Scanner A vulnerability scanner for CVE-2025-3248 in Langflow applications Features Scan single target or multiple targets using FOFA Execute system commands on vulnerable targets Retrieve system information Custom payload support Progress bar for FOFA scanning Beautiful CLI interface Installation Clone the repository: git clone ht

POC - Remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code - CVE-2025-3248 Overview Langflow versions prior to 130 are susceptible to code injection in the /api/v1/validate/code endpoint A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code Read about it — CVE-2025-3248 Disclaimer: Th

Pre-Built Vulnerable Environments Based on Docker-Compose

Vulhub is an open-source collection of pre-built, ready-to-use vulnerable Docker environments With just one command you can launch a vulnerable environment for security research, learning, or demonstration, no prior Docker experience required 中文版本(Chinese version) Quick Start Install Docker (example for Ubuntu 2404): # Install the latest version docker curl -s https:

Scanner and exploit for CVE-2025-3248

CVE-2025-3248 Scanner and exploit for CVE-2025-3248

CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution without authentication, potentially giving attackers control over the server.

CVE-2025-3248 – Execute arbitrary Python code on vulnerable Langflow server Discovered by: Naveen Sunkavally, Horizon3ai Status: Public Disclosure Date Reported: 2025-04-07 CVE ID: CVE-2025-3248 🧾 Screenshot 🧩 Summary A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system This can lead

Langflow validate/code API pre-Auth Remote Code Execution (CVE-2025-3248) 화이트햇 스쿨 3기 - 권석재 @seokjea 요약 Langflow 130 이전 버전의 /api/v1/validate/code API에서는 사용자 입력을 파싱한 뒤 exec 함수로 실행하는 구조를 가지고 있어, Python의 데코레이터 또는 기본 인자 표현식에 악성 코드를 삽입함으로써

Recent Articles

Critical Langflow RCE flaw exploited to hack AI app servers
BleepingComputer • Bill Toulas • 06 May 2025

Critical Langflow RCE flaw exploited to hack AI app servers By Bill Toulas May 6, 2025 12:05 PM 0 The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has tagged a Langflow remote code execution vulnerability as actively exploited, urging organizations to apply security updates and mitigations as soon as possible. The vulnerability is tracked as CVE-2025-3248 and is a critical unauthenticated RCE flaw that allows any attacker on the internet to take full control of vulner...