BACK_TO_FEED

CVE-2025-3248

CRITICALCVSS: 9.8

Langflow exposes a /api/v1/builder/execute_code endpoint that takes user-supplied Python code and passes it directly to exec() on the backend. Since there's no authentication or sandboxing, attackers can craft arbitrary payloads for code execution.

Published: 4/7/2025
Affected: Langflow ≤ v1.3.0

REFERENCES

AVAILABLE_EXPLOITS(1)

Exploit for CVE-2025-3248

@b0ySie7e
4/7/2025

This code is strictly intended for educational and research purposes only.

#RCE#Web#Critical
VERIFIED
VIEW_EXPLOIT