PT-2025-15232 · Langflow · Langflow

Naveen Sunkavally

·

Published

2025-04-07

·

Updated

2026-01-10

·

CVE-2025-3248

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions
Langflow versions prior to 1.3.0
Description
Langflow is vulnerable to an unauthenticated remote code execution (RCE) vulnerability (CVE-2025-3248) due to a missing authentication check in the
/api/v1/validate/code
endpoint. This allows attackers to execute arbitrary code on vulnerable systems without authentication. The Flodrix botnet is actively exploiting this vulnerability to deploy malware, including DDoS attacks and data theft. The vulnerability has a CVSS score of 9.8 and is considered critical. Exploitation involves sending crafted HTTP requests to the vulnerable endpoint. Proof-of-concept exploits are publicly available. The vulnerability has been added to CISA’s KEV catalog. Approximately 466 servers are currently exposed.
Recommendations
Update Langflow to version 1.3.0 or later. Restrict network access to the vulnerable endpoint as a temporary mitigation.

Exploit

Fix

RCE

Missing Authentication

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2025-06683
CVE-2025-3248
GHSA-C995-4FW3-J39M
GHSA-RVQX-WPFH-MFX7
PYSEC-2025-36

Affected Products

Langflow