CVE-2025-3248
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Description
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
Analysis
Langflow before 1.3.0 allows unauthenticated remote code injection through the /api/v1/validate/code endpoint, enabling attackers to execute arbitrary Python code on the server without authentication.
Technical Context
The CWE-306 missing authentication on /api/v1/validate/code allows anyone to submit Python code that is executed server-side. The endpoint was designed to validate LangChain component code but executes it in the process.
Affected Products
['Langflow before 1.3.0']
Remediation
Update to Langflow 1.3.0+. Restrict network access to Langflow. Never expose Langflow directly to the internet.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today