CVE-2025-3248: Langflow: Unauth RCE via code injection endpoint
GHSA-rvqx-wpfh-mfx7 CRITICAL ACTIVELY EXPLOITED PoC AVAILABLE NUCLEI TEMPLATE CISA: ACTPatch Langflow to 1.3.0 immediately — this is an unauthenticated RCE with CVSS 9.8 confirmed actively exploited in the wild (CISA KEV). Any internet-exposed Langflow instance should be treated as compromised until verified. If patching is not immediate, block /api/v1/validate/code at the WAF/firewall and restrict access to trusted IPs only.
Risk Assessment
Maximum risk. CVSS 9.8 with network-accessible, zero-authentication, zero-user-interaction attack vector. EPSS of 0.925 places this in the top 1% of likely-exploited vulnerabilities. CISA KEV listing confirms active exploitation in the wild. Langflow deployments are frequently internet-exposed by design, making this trivially exploitable at scale with no barrier to entry for attackers.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| langflow | pip | — | No patch |
| langflow | pip | < 1.3.0 | 1.3.0 |
| langflow-base | pip | < 0.3.0 | 0.3.0 |
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch immediately: upgrade langflow to ≥1.3.0 and langflow-base to ≥0.3.0.
-
If patching is delayed: block or restrict /api/v1/validate/code at the WAF/reverse proxy; require network-level authentication (VPN, IP allowlisting).
-
Rotate all API keys and credentials stored in or accessible from the Langflow environment.
-
Audit access logs for unexpected POST requests to /api/v1/validate/code — any such traffic is an IOC.
-
Treat unpatched internet-exposed instances as compromised and initiate IR procedures.
-
Scan internal deployments via Shodan/Censys query for exposed instances before attackers do.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-3248?
Patch Langflow to 1.3.0 immediately — this is an unauthenticated RCE with CVSS 9.8 confirmed actively exploited in the wild (CISA KEV). Any internet-exposed Langflow instance should be treated as compromised until verified. If patching is not immediate, block /api/v1/validate/code at the WAF/firewall and restrict access to trusted IPs only.
Is CVE-2025-3248 actively exploited?
Yes, CVE-2025-3248 is confirmed actively exploited and listed in CISA Known Exploited Vulnerabilities catalog since Mon May 05 2025 00:00:00 GMT+0000 (Coordinated Universal Time).
How to fix CVE-2025-3248?
1. Patch immediately: upgrade langflow to ≥1.3.0 and langflow-base to ≥0.3.0. 2. If patching is delayed: block or restrict /api/v1/validate/code at the WAF/reverse proxy; require network-level authentication (VPN, IP allowlisting). 3. Rotate all API keys and credentials stored in or accessible from the Langflow environment. 4. Audit access logs for unexpected POST requests to /api/v1/validate/code — any such traffic is an IOC. 5. Treat unpatched internet-exposed instances as compromised and initiate IR procedures. 6. Scan internal deployments via Shodan/Censys query for exposed instances before attackers do.
What systems are affected by CVE-2025-3248?
This vulnerability affects the following AI/ML architecture patterns: LLM workflow builders, agent frameworks, RAG pipelines, AI development platforms, model serving.
What is the CVSS score for CVE-2025-3248?
CVE-2025-3248 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 91.81%.
Technical Details
NVD Description
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
Exploitation Scenario
An attacker identifies internet-exposed Langflow instances via Shodan or Censys (no auth required to query). Without any credentials, they send a crafted HTTP POST to /api/v1/validate/code containing a Python payload wrapped in exec(). Langflow's code validation endpoint executes the payload server-side, granting an immediate reverse shell. From there, the attacker extracts all LLM API keys from environment variables and config files, accesses connected vector stores and PostgreSQL databases, and pivots to cloud provider APIs to fully compromise the broader AI infrastructure. Total time from identification to shell: under five minutes.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- cisa.gov/known-exploited-vulnerabilities-catalog US Gov
- github.com/langflow-ai/langflow/pull/6911 Patch
- github.com/langflow-ai/langflow/releases/tag/1.3.0 Release
- horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/ Exploit 3rd Party
- vulncheck.com/advisories/langflow-unauthenticated-rce 3rd Party
- github.com/advisories/GHSA-rvqx-wpfh-mfx7
- github.com/langflow-ai/langflow/commit/faac4db133de32fcb6d483fa9ff52f40ce42bdc0
- github.com/langflow-ai/langflow/security/advisories/GHSA-rvqx-wpfh-mfx7
- nvd.nist.gov/vuln/detail/CVE-2025-3248
- horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai
- github.com/0-d3y/langflow-rce-exploit Exploit
- github.com/0ctf/vulhub Exploit
- github.com/0xgh057r3c0n/CVE-2025-3248 Exploit
- github.com/ARPSyndicate/cve-scores Exploit
- github.com/Aimtech7/web-test2 Exploit
- github.com/AmokNepal/langflow Exploit
- github.com/AngelPalominoF/Buho-IA Exploit
- github.com/AngelPalominoF/Martina-IA Exploit
- github.com/B1ack4sh/Blackash-CVE-2025-3248 Exploit
- github.com/CloudGeometry/LangBuilder Exploit
- github.com/EQSTLab/CVE-2025-3248 Exploit
- github.com/Gideongideon5/langflow-agent Exploit
- github.com/GovindMalviya/awesome-langflow Exploit
- github.com/Health-Copilot-AI/langflow Exploit
- github.com/ILYESS24/langflow2.0 Exploit
- github.com/IhorKondratenko/langflow Exploit
- github.com/J1ezds/Vulnerability-Wiki-page Exploit
- github.com/J4c0b-1337x007/ethical-exploit-playground Exploit
- github.com/JeenAI-Team/Langflow-Jeen Exploit
- github.com/JeenAI-Team/Langflow-Ngnix Exploit
- github.com/JeenAI-Team/langflows_v2 Exploit
- github.com/Kiraly07/Demo_CVE-2025-3248 Exploit
- github.com/Lern0n/Lernon-POC Exploit
- github.com/MatDupas/Custom-Nmap-Scripts Exploit
- github.com/Pawan22104168/Langflow_UI Exploit
- github.com/Praison001/CVE-2025-3248 Exploit
- github.com/PuddinCat/CVE-2025-3248-POC Exploit
- github.com/PuddinCat/GithubRepoSpider Exploit
- github.com/Rahu7p/MyLangflow Exploit
- github.com/Tetsuro-Copa/langflow Exploit
- github.com/Threekiii/Awesome-POC Exploit
- github.com/Threekiii/CVE Exploit
- github.com/Vip3rLi0n/CVE-2025-3248 Exploit
- github.com/a1batr0ssG/VulhubExpand Exploit
- github.com/adolfcg/mixtli25 Exploit
- github.com/aloewright/langflow Exploit
- github.com/arsharma2005/adding-button Exploit
- github.com/aryan-spanda/langflow-main Exploit
- github.com/autocode07/langflow-ai__langflow.087c1a25 Exploit
- github.com/autocode07/langflow-ai__langflow.b093c1fa Exploit
- github.com/charlesin4g/langflow-main Exploit
- github.com/codevakure/lu-edit Exploit
- github.com/damonfmcmillan/langflow Exploit
- github.com/dennisec/Mass-CVE-2025-3248 Exploit
- github.com/eeeeeeeeee-code/POC Exploit
- github.com/galgantar/langflow-cve Exploit
- github.com/ill-deed/Langflow-CVE-2025-3248-Multi-target Exploit
- github.com/imbas007/CVE-2025-3248 Exploit
- github.com/issamjr/CVE-2025-3248-Scanner Exploit
- github.com/khulnasoft-lab/AiEXEC Exploit
- github.com/khulnasoft/aiexec Exploit
- github.com/langflow-ai/langflow Exploit
- github.com/min8282/CVE-2025-3248 Exploit
- github.com/neurdev/langflow-exploit Exploit
- github.com/nomi-sec/PoC-in-GitHub Exploit
- github.com/nvn1729/advisories Exploit
- github.com/oLy0/Vulnerability Exploit
- github.com/packetinside/CISA_BOT Exploit
- github.com/peiqiF4ck/WebFrameworkTools-5.1-main Exploit
- github.com/peiqiF4ck/WebFrameworkTools-5.5 Exploit
- github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance Exploit
- github.com/plzheheplztrying/cve_monitor Exploit
- github.com/preemware/langflow-exploit Exploit
- github.com/r0otk3r/CVE-2025-3248 Exploit
- github.com/seokjea/whs Exploit
- github.com/tanjiti/sec_profile Exploit
- github.com/tiemio/RCE-CVE-2025-3248 Exploit
- github.com/tonyistark/AIBuilder Exploit
- github.com/ums91/CISA_BOT Exploit
- github.com/verylazytech/CVE-2025-3248 Exploit
- github.com/vigilante-1337/CVE-2025-3248 Exploit
- github.com/vulhub/vulhub Exploit
- github.com/waldirjunior/teste-context-langflow Exploit
- github.com/wand3rlust/CVE-2025-3248 Exploit
- github.com/xuemian168/CVE-2025-3248 Exploit
- github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE Exploit
- github.com/zapstiko/CVE-2025-3248 Exploit
- github.com/zr1p3r/CVE-2025-3248 Exploit
Timeline
Scanner Template Available
A Nuclei vulnerability scanner template exists for this CVE. You can scan your infrastructure for this vulnerability immediately.
View template on GitHubnuclei -t http/cves/2025/CVE-2025-3248.yaml -u https://target.example.com Related Vulnerabilities
CVE-2026-33309 9.9 langflow: Path Traversal enables file access
Same package: langflow CVE-2024-37014 9.8 Langflow: unauthenticated RCE via custom component API
Same package: langflow CVE-2026-27966 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2026-33017 9.8 langflow: Code Injection enables RCE
Same package: langflow CVE-2024-42835 9.8 Langflow: Unauthenticated RCE via PythonCodeTool
Same package: langflow
AI Threat Alert