Share
## https://sploitus.com/exploit?id=F83CDFB9-6464-552A-9DA9-EE4E0B0EFBCF
# CVE-2025-3248
**Langflow** is a low-code platform primarily used for building and deploying AI agents and workflows. It simplifies the development process by providing a visual interface for creating complex AI applications, including chatbots, RAG (Retrieval-Augmented Generation) systems, and more.

Langflow versions prior to 1.3.0 are vulnerable to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP POST requests to execute arbitrary code.

**Usage example:** python3 exploit.py -u http://localhost:7860/

**Disclaimer:** This exploit is to be used only for educational and authorized testing purposes. Illegal/unauthorized use of this exploit is prohibited. I am not responsible for any misuse or damage caused by this script.

**References:** https://horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/