First published: Mon Apr 07 2025(Updated: )
Langflow contains a missing authentication vulnerability in the /api/v1/validate/code endpoint that allows a remote, unauthenticated attacker to execute arbitrary code via crafted HTTP requests.
Credit: disclosure@vulncheck.com
Affected Software | Affected Version | How to fix |
---|---|---|
Langflow | <1.3.0 | |
pip/langflow | <1.3.0 | 1.3.0 |
Langflow | ||
Langflow | <1.3.0 |
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-3248 is critical due to its potential for remote code execution.
To fix CVE-2025-3248, upgrade to Langflow version 1.3.0 or later.
CVE-2025-3248 affects all versions of Langflow prior to 1.3.0.
Yes, CVE-2025-3248 can be exploited remotely by unauthenticated attackers.
CVE-2025-3248 is a code injection vulnerability.