PT-2025-15232 · Langflow · Langflow

Naveen Sunkavally

·

Published

2025-04-07

·

Updated

2026-04-29

·

CVE-2025-3248

CVSS v2.0

10

Critical

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Langflow versions prior to 1.3.0
Description Langflow is susceptible to unauthenticated remote code execution due to a code injection flaw in the /api/v1/validate/code endpoint. A remote attacker can send crafted HTTP requests containing malicious Python code via the code parameter to execute arbitrary commands on the server, potentially leading to full system compromise. This issue is caused by insufficient input validation during the compilation of Python code and a lack of authentication for this critical function.
Real-world exploitation has been observed involving the Flodrix botnet, which uses Python-based malware to conduct DDoS attacks and steal data. Attackers have utilized reconnaissance tools like Shodan and FOFA to identify publicly accessible servers and employed evasion techniques such as string obfuscation and self-deletion to avoid detection.
Recommendations Update to version 1.3.0 or higher. Restrict network access to the API to eliminate public exposure. Block POST requests to the /api/v1/validate/code endpoint that contain Python operators such as exec, Exception, import, print, or system in the request body.

Exploit

Fix

RCE

Missing Authentication

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2025-06683
CVE-2025-3248
GHSA-C995-4FW3-J39M
GHSA-RVQX-WPFH-MFX7
PYSEC-2025-36

Affected Products

Langflow