CVE-2025-3248

CRITICAL
2025-04-07 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 28, 2026 - 18:35 vuln.today
Patch Released
Mar 28, 2026 - 18:35 nvd
Patch available
PoC Detected
Nov 06, 2025 - 13:57 vuln.today
Public exploit code
Added to CISA KEV
Nov 06, 2025 - 13:57 cisa
CISA KEV
CVE Published
Apr 07, 2025 - 15:15 nvd
CRITICAL 9.8

Description

Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.

Analysis

Langflow before 1.3.0 allows unauthenticated remote code injection through the /api/v1/validate/code endpoint, enabling attackers to execute arbitrary Python code on the server without authentication.

Technical Context

The CWE-306 missing authentication on /api/v1/validate/code allows anyone to submit Python code that is executed server-side. The endpoint was designed to validate LangChain component code but executes it in the process.

Affected Products

['Langflow before 1.3.0']

Remediation

Update to Langflow 1.3.0+. Restrict network access to Langflow. Never expose Langflow directly to the internet.

Priority Score

211
Low Medium High Critical
KEV: +50
EPSS: +92.1
CVSS: +49
POC: +20

Share

CVE-2025-3248 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy