exploitdb
WORKING POC
by Raghad Abdallah Al-syouf · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52364
This exploit targets CVE-2025-3248 in Langflow <= 1.2.x, leveraging an unauthenticated API endpoint `/api/v1/validate/code` that improperly evaluates arbitrary Python code via `exec()`. The PoC sends a crafted payload to execute system commands and retrieves the output from the error response.
Classification
Working Poc 95%
Target:
Langflow <= 1.2.x
No auth needed
Prerequisites:
Network access to the target's exposed API endpoint
exploitdb
WORKING POC
by VeryLazyTech · textremotemultiple
https://www.exploit-db.com/exploits/52262
This exploit demonstrates a remote code execution vulnerability in Langflow versions prior to 1.3.0 by sending a crafted HTTP request to the '/api/v1/validate/code' endpoint, which executes arbitrary commands via Python's exec function.
Classification
Working Poc 95%
Target:
Langflow < 1.3.0
No auth needed
Prerequisites:
Network access to the target Langflow instance
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Langflow-CVE-2025-3248-RCE.py
The repository contains a functional exploit PoC for CVE-2026-22812, targeting OpenCode for remote command execution (RCE). The script establishes a session, then sends a crafted JSON payload to execute the 'id' command, verifying RCE by checking for 'uid=' and 'gid=' in the response.
Classification
Working Poc 95%
Target:
OpenCode (version not specified)
No auth needed
Prerequisites:
Network access to the target · OpenCode service exposed on the network
nomisec
WORKING POC
16 stars
by ynsmroztas · remote
https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
This repository contains a Python-based exploit for CVE-2025-3248, targeting a remote code execution vulnerability in Langflow via the `/api/v1/validate/code` endpoint. The exploit leverages dynamic `exec()` misuse to achieve unauthenticated RCE.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to the target Langflow instance · Exposed `/api/v1/validate/code` endpoint
nomisec
WORKING POC
10 stars
by verylazytech · remote
https://github.com/verylazytech/CVE-2025-3248
This repository contains a functional exploit for CVE-2025-3248, targeting a code injection vulnerability in Langflow's /api/v1/validate/code endpoint. The exploit sends a crafted HTTP request with a malicious payload to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Langflow versions prior to 1.3.0
No auth needed
Prerequisites:
Network access to the target's /api/v1/validate/code endpoint
nomisec
WORKING POC
8 stars
by xuemian168 · remote
https://github.com/xuemian168/CVE-2025-3248
This repository contains a functional exploit for CVE-2025-3248, targeting Langflow applications. The exploit leverages a code injection vulnerability in the `/api/v1/validate/code` endpoint to execute arbitrary commands, demonstrated via a `whoami` payload.
Classification
Working Poc 95%
Target:
Langflow (version not explicitly specified, but likely <= 1.3.0 based on references)
No auth needed
Prerequisites:
Network access to the target's `/api/v1/validate/code` endpoint
nomisec
WORKING POC
7 stars
by 0-d3y · remote
https://github.com/0-d3y/langflow-rce-exploit
This repository contains a functional Python-based exploit for CVE-2025-3248, targeting Langflow with multiple RCE methods including interactive shell, reverse shell, and command execution. The exploit includes advanced features like payload obfuscation, file transfer, and persistence mechanisms.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to target Langflow instance · Python 3.6+ with required libraries
nomisec
WORKING POC
3 stars
by drackyjr · remote
https://github.com/drackyjr/cve-2025-3248-exploit
This repository contains a functional exploit for CVE-2025-3248, an unauthenticated RCE vulnerability in Langflow ≤ 1.3.0. The exploit leverages unsafe `exec()` usage in the `/api/v1/validate/code` endpoint to execute arbitrary Python code, including reverse shells and command injection.
Classification
Working Poc 95%
Target:
Langflow ≤ 1.3.0
No auth needed
Prerequisites:
Network access to vulnerable Langflow instance
github
SCANNER
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-3248
The repository contains a scanner for CVE-2024-21762, a Fortinet SSL VPN vulnerability, which checks for the presence of the vulnerability by sending crafted HTTP requests. It includes Python scripts to test individual hosts or multiple hosts from a file.
Classification
Scanner 90%
Target:
Fortinet SSL VPN
No auth needed
Prerequisites:
network access to the target Fortinet SSL VPN interface
nomisec
WORKING POC
2 stars
by b0ySie7e · remote
https://github.com/b0ySie7e/CVE-2025-3248-POC
This repository contains a functional Rust-based exploit for CVE-2025-3248, targeting an unauthenticated RCE vulnerability in Langflow's `/api/v1/validate/code` endpoint via unsanitized `exec()` usage. The PoC sends a crafted Python payload to execute arbitrary commands and extracts the output from the error response.
Classification
Working Poc 95%
Target:
Langflow ≤ v1.3.0
No auth needed
Prerequisites:
Network access to the target's `/api/v1/validate/code` endpoint
github
WORKING POC
2 stars
by Kiraly07 · pythonremote
https://github.com/Kiraly07/Demo_CVE-2025-3248
This repository contains a functional exploit for CVE-2025-3248, targeting a vulnerability in Langflow (version 1.2.0). The exploit leverages a remote code execution (RCE) flaw by sending a crafted payload to the '/api/v1/validate/code' endpoint, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Langflow 1.2.0
No auth needed
Prerequisites:
Docker and Docker Compose for lab setup · Python 3.10+ with required dependencies
nomisec
WORKING POC
2 stars
by dennisec · remote
https://github.com/dennisec/Mass-CVE-2025-3248
This repository contains a functional exploit for CVE-2025-3248, targeting Langflow's `/api/v1/validate/code` endpoint to achieve unauthenticated remote code execution (RCE) via Python code injection. The exploit sends a crafted payload that executes arbitrary commands through `subprocess.check_output`.
Classification
Working Poc 95%
Target:
Langflow versions prior to 1.3.0
No auth needed
Prerequisites:
Network access to the target Langflow API endpoint
nomisec
WORKING POC
1 stars
by 12-test-12 · remote
https://github.com/12-test-12/CVE-2025-3248
This repository contains a functional Python exploit for CVE-2025-3248, demonstrating remote code execution (RCE) via a code injection vulnerability in a web application's API endpoint. The exploit constructs a malicious payload to execute arbitrary system commands through the `/api/v1/validate/code` interface.
Classification
Working Poc 95%
Target:
Unspecified web application with vulnerable API endpoint
No auth needed
Prerequisites:
Access to the target API endpoint · Python 3.7+ with `requests` library
nomisec
WORKING POC
1 stars
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2025-3248
This repository contains a scanner and exploit for CVE-2025-3248, an unauthenticated RCE vulnerability in Langflow AI. The scanner checks for vulnerability by executing a payload that reads /etc/passwd, while the exploit generates a reverse shell payload.
Classification
Working Poc 95%
Target:
Langflow AI
No auth needed
Prerequisites:
Network access to the target · Python environment with requests library
nomisec
WORKING POC
1 stars
by zapstiko · remote
https://github.com/zapstiko/CVE-2025-3248
This is a functional Python exploit for CVE-2025-3248, targeting a remote code execution vulnerability in Langflow via the `/api/v1/validate/code` endpoint. The exploit injects a malicious Python function into the API, triggering command execution through `subprocess.check_output`.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to the target Langflow instance · Exposed `/api/v1/validate/code` endpoint
nomisec
WORKING POC
1 stars
by imbas007 · remote
https://github.com/imbas007/CVE-2025-3248
This is a functional Python exploit for CVE-2025-3248, targeting Langflow instances with unauthenticated remote code execution via crafted HTTP requests to the `/api/v1/validate/code` endpoint. It supports both single-target and bulk scanning with custom command execution.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to the target Langflow instance · Vulnerable `/api/v1/validate/code` endpoint
nomisec
WORKING POC
1 stars
by tiemio · remote
https://github.com/tiemio/RCE-CVE-2025-3248
This repository contains a Python-based exploit for CVE-2025-3248, targeting an authenticated RCE vulnerability in Langflow. The exploit supports command execution and reverse shell functionality via a crafted API request.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
Auth required
Prerequisites:
Valid admin credentials · Network access to the target · Python 3.x with requests library
nomisec
WRITEUP
1 stars
by vigilante-1337 · remote
https://github.com/vigilante-1337/CVE-2025-3248
The repository provides a detailed writeup for CVE-2025-3248, an arbitrary Python code execution vulnerability in Langflow versions up to 1.2.0. It describes the impact, affected versions, and references but does not include exploit code.
Classification
Writeup 90%
Target:
Langflow (versions 0 through 1.2.0)
No auth needed
Prerequisites:
Network access to vulnerable Langflow server
nomisec
WORKING POC
1 stars
by Praison001 · remote
https://github.com/Praison001/CVE-2025-3248
This exploit targets a code injection vulnerability in Langflow's /api/v1/validate/code endpoint, allowing unauthenticated remote code execution. It includes both a vulnerability scanner and a reverse shell payload for exploitation.
Classification
Working Poc 95%
Target:
Langflow < 1.3.0
No auth needed
Prerequisites:
Network access to the target's /api/v1/validate/code endpoint
nomisec
WORKING POC
1 stars
by PuddinCat · remote
https://github.com/PuddinCat/CVE-2025-3248-POC
This repository contains a functional PoC for CVE-2025-3248, demonstrating remote code execution (RCE) via a vulnerable API endpoint in Langflow. The exploit leverages a code validation flaw to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to the target's API endpoint · Python environment with `requests` and `httpx` libraries
nomisec
WORKING POC
by wand3rlust · remote
https://github.com/wand3rlust/CVE-2025-3248
This repository contains a functional exploit for CVE-2025-3248, targeting Langflow versions prior to 1.3.0. The exploit leverages unauthenticated code injection via the `/api/v1/validate/code` endpoint to execute arbitrary Python code, establishing a reverse shell.
Classification
Working Poc 100%
Target:
Langflow < 1.3.0
No auth needed
Prerequisites:
Network access to the target's `/api/v1/validate/code` endpoint · A listener set up on the attacker's machine to receive the reverse shell
github
WORKING POC
by bambooqj · pythonremote
https://github.com/bambooqj/cve-2025-3248
This repository contains a functional Python exploit for CVE-2025-3248, targeting Langflow for remote code execution (RCE). The exploit leverages a code injection vulnerability in the `/api/v1/validate/code` endpoint, allowing arbitrary command execution via crafted payloads.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to the target Langflow instance · Exposed `/api/v1/validate/code` endpoint
nomisec
WORKING POC
by min8282 · remote
https://github.com/min8282/CVE-2025-3248
This repository contains a functional proof-of-concept exploit for CVE-2025-3248, a remote code execution vulnerability in Langflow versions prior to 1.3.0. The exploit leverages the /api/v1/validate/code endpoint to inject and execute arbitrary commands via crafted Python code.
Classification
Working Poc 95%
Target:
Langflow < 1.3.0
No auth needed
Prerequisites:
Network access to the target's /api/v1/validate/code endpoint
nomisec
WORKING POC
by EQSTLab · remote
https://github.com/EQSTLab/CVE-2025-3248
This repository contains a functional proof-of-concept exploit for CVE-2025-3248, targeting Langflow versions prior to 1.3.0. The exploit leverages a code injection vulnerability in the /api/v1/validate/code endpoint to achieve remote code execution (RCE) without authentication.
Classification
Working Poc 95%
Target:
Langflow < 1.3.0
No auth needed
Prerequisites:
Network access to the target's /api/v1/validate/code endpoint
nomisec
WORKING POC
by ill-deed · remote
https://github.com/ill-deed/Langflow-CVE-2025-3248-Multi-target
This repository contains a Python-based scanner and exploit for CVE-2025-3248, targeting unauthenticated RCE in Langflow via the `/api/v1/validate/code` endpoint. The exploit abuses dynamic code evaluation to execute arbitrary shell commands.
Classification
Working Poc | Scanner 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to the target Langflow instance · Target must have the vulnerable `/api/v1/validate/code` endpoint exposed
github
WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/Langflow-CVE-2025-3248
The repository contains functional exploit code for CVE-2025-3248, targeting Langflow. The exploit demonstrates remote code execution (RCE) by leveraging a vulnerability in the software, with clear instructions and supporting Docker setup for testing.
Classification
Working Poc 95%
Target:
Langflow (version not specified)
No auth needed
Prerequisites:
Network access to the target Langflow instance · Python environment to run the exploit
nomisec
WORKING POC
by 0xgh057r3c0n · remote
https://github.com/0xgh057r3c0n/CVE-2025-3248
This is a functional proof-of-concept exploit for CVE-2025-3248, targeting an unauthenticated remote code execution vulnerability in Langflow AI via the `/api/v1/validate/code` endpoint. It provides an interactive shell for executing arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Langflow AI (version not specified)
No auth needed
Prerequisites:
Python 3.8 or newer · requests library · colorama library · network access to target
nomisec
WORKING POC
by Vip3rLi0n · remote
https://github.com/Vip3rLi0n/CVE-2025-3248
This PoC exploits CVE-2025-3248, a remote code execution vulnerability in Langflow API via code injection. It allows command execution and reverse shell establishment through a vulnerable API endpoint.
Classification
Working Poc 95%
Target:
Langflow API (version not specified)
No auth needed
Prerequisites:
Network access to the vulnerable API endpoint · Python environment with required libraries (requests, colorama)
metasploit
WORKING POC
EXCELLENT
by Naveen Sunkavally (Horizon3.ai), Takahiro Yokoyama · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/langflow_unauth_rce_cve_2025_3248.rb
This Metasploit module exploits an unauthenticated remote code execution vulnerability in Langflow AI versions prior to 1.3.0 via the /api/v1/validate/code endpoint. It sends a crafted HTTP request with a Python payload to achieve RCE.
Classification
Working Poc 100%
Target:
Langflow AI < 1.3.0
No auth needed
Prerequisites:
Network access to the target server · Target running Langflow AI < 1.3.0