Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-3248 PoC — Langflow 安全漏洞

Source
Associated Vulnerability
Title:Langflow 安全漏洞 (CVE-2025-3248)
Description:Langflow是Langflow开源的一个用于构建多代理和 RAG 应用程序的可视化框架。 Langflow 1.3.0之前版本存在安全漏洞,该漏洞源于/api/v1/validate/code端点存在代码注入漏洞,可能导致远程未经验证的攻击者执行任意代码。
Description
Scanner and exploit for CVE-2025-3248
Readme
# CVE-2025-3248
**Langflow** is a low-code platform primarily used for building and deploying AI agents and workflows. It simplifies the development process by providing a visual interface for creating complex AI applications, including chatbots, RAG (Retrieval-Augmented Generation) systems, and more.

Langflow versions prior to 1.3.0 are vulnerable to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP POST requests to execute arbitrary code.

**Usage example:** python3 exploit.py -u http://localhost:7860/

**Disclaimer:** This exploit is to be used only for educational and authorized testing purposes. Illegal/unauthorized use of this exploit is prohibited. I am not responsible for any misuse or damage caused by this script.

**References:** https://horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/
File Snapshot

[4.0K] /data/pocs/4677242799c1784fd3634ef9b10a8780b4a93093 ├── [2.1K] exploit.py └── [ 934] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.