Home

Description

Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.

PUBLISHED Reserved 2025-04-04 | Published 2025-04-07 | Updated 2025-07-30 | Assigner VulnCheck




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA Known Exploited Vulnerability

Date added 2025-05-05 | Due date 2025-05-26

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version
affected

Credits

Naveen Sunkavally, Horizon3.ai finder

References

github.com/langflow-ai/langflow/pull/6911 patch

github.com/langflow-ai/langflow/releases/tag/1.3.0 release-notes

www.horizon3.ai/...ython-exec-for-unauth-rce-in-langflow-ai/ exploit

cve.org (CVE-2025-3248)

nvd.nist.gov (CVE-2025-3248)

Download JSON