Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-3248 PoC — Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code

Source
Associated Vulnerability
Title:Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code (CVE-2025-3248)
Description:Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
Description
POC of CVE-2025-3248, RCE of LangFlow
Readme
# CVE-2025-3248-POC

POC of CVE-2025-3248

execute any command on target machine

usage: `python poc.py 'http://xxx.com' 'ls /'`

leave some love on victims' computers

[poc.py](./poc.py)
File Snapshot

[4.0K] /data/pocs/49a35b557d0abc85acce5ef609036d237ba45c19 ├── [1.0K] LICENSE ├── [1.4K] patch.py ├── [1.1K] poc.py └── [ 188] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →