PT-2025-15232 · Langflow · Langflow

Naveen Sunkavally

·

Published

2025-04-07

·

Updated

2026-03-01

·

CVE-2025-3248

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Langflow versions prior to 1.3.0
Description Langflow is vulnerable to an unauthenticated remote code execution (RCE) vulnerability (CVE-2025-3248) due to a missing authentication check in the /api/v1/validate/code endpoint. This allows attackers to execute arbitrary code on vulnerable systems without authentication. The Flodrix botnet is actively exploiting this vulnerability to deploy malware, including DDoS capabilities. The vulnerability has a CVSS score of 9.8 and is considered critical. Exploitation involves sending crafted HTTP requests to the vulnerable endpoint. Proof-of-concept exploits are publicly available. Over 460 servers are reportedly exposed.
Recommendations Upgrade Langflow to version 1.3.0 or later to address this vulnerability. Restrict network access to the affected systems as a temporary mitigation.

Exploit

Fix

RCE

Missing Authentication

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2025-06683
CVE-2025-3248
GHSA-C995-4FW3-J39M
GHSA-RVQX-WPFH-MFX7
PYSEC-2025-36

Affected Products

Langflow