Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
https://hackread.com/langflow-vulnerability-cve-2025-3248-actively-exploited-cisa/
https://www.securityweek.com/critical-vulnerability-in-ai-builder-langflow-under-attack/
https://www.cisa.gov/news-events/alerts/2025/05/05/cisa-adds-one-known-exploited-vulnerability-catalog
https://www.horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/
https://github.com/langflow-ai/langflow/releases/tag/1.3.0
https://github.com/langflow-ai/langflow/pull/6911
Source: Mitre, NVD
Published: 2025-04-07
Updated: 2025-05-07
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.90773