We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3248

Langflow Unauth RCE



Description

Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.

Reserved 2025-04-04 | Published 2025-04-07 | Updated 2025-05-05 | Assigner VulnCheck


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA Known Exploited Vulnerability

Date added 2025-05-05 | Due date 2025-05-26

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version
affected

Credits

Naveen Sunkavally, Horizon3.ai finder

References

github.com/langflow-ai/langflow/pull/6911 patch

github.com/langflow-ai/langflow/releases/tag/1.3.0 release-notes

www.horizon3.ai/...ython-exec-for-unauth-rce-in-langflow-ai/ exploit

cve.org (CVE-2025-3248)

nvd.nist.gov (CVE-2025-3248)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3248

Support options

Helpdesk Chat, Email, Knowledgebase