Latest Langflow vulnerability #
A vulnerability has been discovered in Langflow, a popular framework for building AI workflows. This vulnerability, designated CVE-2025-3248 has a CVSS score of 9.8 (critical). Successfully exploiting this vulnerability would allow a remote, unauthenticated attacker to execute arbitrary code on the vulnerable system.
Note that CISA has indicated that there is evidence this vulnerability is being exploited in the wild.
Update: As of June 17th, 2025, there is evidence that this vulnerability is actively being exploited as part of the Flodrix botnet. Trend Micro has published a report detailing an active campaign that utilizes an open-source proof of concept (PoC) exploit for CVE-2025-3248 to initially compromise the system. The attacker then downloads and executes the Flodrix malware to establish communication with the command and control (C&C) server for the Flodrix botnet.
What is the impact? #
Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable system with the privileges of the Langflow process. This vulnerability is exploitable remotely and without authentication.
Are updates available? #
The Langflow project has released version 1.3.0 to address this vulnerability and urges all users to upgrade to that or a later version as quickly as possible.
How do I find potentially vulnerable Langflow installations with runZero? #
Vulnerable devices can be found by navigating to the Software Inventory and using the following query:
_asset.protocol:http AND product:Langflow AND (version:>0 AND version:<1.3.0)