CVE-2025-3248

CRITICAL KEV NUCLEI LAB

Langflow AI - Unauthenticated Remote Code Execution

Title source: nuclei

Description

Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.

Exploits (34)

exploitdb WORKING POC
by Raghad Abdallah Al-syouf · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52364
exploitdb WORKING POC
by VeryLazyTech · textremotemultiple
https://www.exploit-db.com/exploits/52262
github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Langflow-CVE-2025-3248-RCE.py
nomisec WORKING POC 16 stars
by ynsmroztas · remote
https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
nomisec WORKING POC 10 stars
by verylazytech · remote
https://github.com/verylazytech/CVE-2025-3248
nomisec WORKING POC 8 stars
by xuemian168 · remote
https://github.com/xuemian168/CVE-2025-3248
nomisec WORKING POC 7 stars
by 0-d3y · remote
https://github.com/0-d3y/langflow-rce-exploit
nomisec WORKING POC 3 stars
by drackyjr · remote
https://github.com/drackyjr/cve-2025-3248-exploit
github SCANNER 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-3248
nomisec WORKING POC 2 stars
by b0ySie7e · remote
https://github.com/b0ySie7e/CVE-2025-3248-POC
github WORKING POC 2 stars
by Kiraly07 · pythonremote
https://github.com/Kiraly07/Demo_CVE-2025-3248
nomisec WORKING POC 2 stars
by dennisec · remote
https://github.com/dennisec/Mass-CVE-2025-3248
nomisec WORKING POC 1 stars
by 12-test-12 · remote
https://github.com/12-test-12/CVE-2025-3248
nomisec WORKING POC 1 stars
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2025-3248
nomisec WORKING POC 1 stars
by zapstiko · remote
https://github.com/zapstiko/CVE-2025-3248
nomisec WORKING POC 1 stars
by imbas007 · remote
https://github.com/imbas007/CVE-2025-3248
nomisec WORKING POC 1 stars
by tiemio · remote
https://github.com/tiemio/RCE-CVE-2025-3248
nomisec WRITEUP 1 stars
by vigilante-1337 · remote
https://github.com/vigilante-1337/CVE-2025-3248
nomisec WORKING POC 1 stars
by Praison001 · remote
https://github.com/Praison001/CVE-2025-3248
nomisec WORKING POC 1 stars
by PuddinCat · remote
https://github.com/PuddinCat/CVE-2025-3248-POC
nomisec WORKING POC
by wand3rlust · remote
https://github.com/wand3rlust/CVE-2025-3248
github WORKING POC
by bambooqj · pythonremote
https://github.com/bambooqj/cve-2025-3248
nomisec WORKING POC
by min8282 · remote
https://github.com/min8282/CVE-2025-3248
nomisec WORKING POC
by EQSTLab · remote
https://github.com/EQSTLab/CVE-2025-3248
nomisec WORKING POC
by ill-deed · remote
https://github.com/ill-deed/Langflow-CVE-2025-3248-Multi-target
github WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/Langflow-CVE-2025-3248
nomisec WORKING POC
by 0xgh057r3c0n · remote
https://github.com/0xgh057r3c0n/CVE-2025-3248
nomisec WORKING POC
by Vip3rLi0n · remote
https://github.com/Vip3rLi0n/CVE-2025-3248
metasploit WORKING POC EXCELLENT
by Naveen Sunkavally (Horizon3.ai), Takahiro Yokoyama · rubypocpython
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/langflow_unauth_rce_cve_2025_3248.rb

Nuclei Templates (1)

Langflow AI - Unauthenticated Remote Code Execution
CRITICALVERIFIEDby nvn1729
Shodan: html:"Langflow"

Scores

CVSS v3 9.8
EPSS 0.9181
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull docker.io/vulhub/langflow:1.2.0
docker pull langflowai/langflow:1.2.0
docker pull langflow-1.2.0-cve3248:latest
docker pull vulhub/langflow:1.2.0
docker pull langflowai/langflow:1.3.0
+24 more repos

Details

CISA KEV 2025-05-05
VulnCheck KEV 2025-04-12
ENISA EUVD EUVD-2025-10011
CWE
CWE-306 CWE-94
Status published
Products (3)
langflow/langflow < 1.3.0
pypi/langflow 0 - 1.3.0PyPI
pypi/langflow-base 0 - 0.3.0PyPI
Published Apr 07, 2025
KEV Added May 05, 2025
Tracked Since Feb 18, 2026