Scanner and exploit for CVE-2025-3248# CVE-2025-3248
**Langflow** is a low-code platform primarily used for building and deploying AI agents and workflows. It simplifies the development process by providing a visual interface for creating complex AI applications, including chatbots, RAG (Retrieval-Augmented Generation) systems, and more.
Langflow versions prior to 1.3.0 are vulnerable to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP POST requests to execute arbitrary code.
**Usage example:** python3 exploit.py -u http://localhost:7860/
**Disclaimer:** This exploit is to be used only for educational and authorized testing purposes. Illegal/unauthorized use of this exploit is prohibited. I am not responsible for any misuse or damage caused by this script.
**References:** https://horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/
[4.0K] /data/pocs/4677242799c1784fd3634ef9b10a8780b4a93093
├── [2.1K] exploit.py
└── [ 934] README.md
0 directories, 2 files