CVE-2025-3248

Aliases:GHSA-rvqx-wpfh-mfx7PYSEC-2025-36
Analyzed
Published: 07 Apr 2025, 14:22
Last modified:29 Nov 2025, 02:05

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
9.8 CRITICAL
v3.1 (cve.org)
EPSS Score
91.97% CRITICAL
92% probability +0.55%
KEV
Listed
CISA
1 listing
Ransomware
No reports
Public exploits
4 found
Dark Web
Not detected

Timeline

07 Apr 2025, 14:22
Published
Vulnerability first disclosed
05 May 2025, 00:00
Added to CISA KEV
Langflow Missing Authentication Vulnerability
26 May 2025, 00:00
CISA Remediation Due
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
29 Nov 2025, 02:05
Last Modified
Vulnerability information updated

Description

Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.

CVSS Metrics

  • v3.1CRITICALScore: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Trends

Current EPSS score: 91.97% Percentile: 100%

Techniques & Countermeasures

  • CWE-94Improper Control of Generation of Code ('Code Injection')

    The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

  • CWE-306Missing Authentication for Critical Function

    The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

Affected Systems

  • langflow-ailangflow

    < 1.3.0

  • UnknownLangflow

    < 1.3.0

  • PyPIlangflow

    < 1.3.0

  • PyPIlangflow-base

    < 0.3.0

References (10)