Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-3248 PoC — Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code

Source
Associated Vulnerability
Title:Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code (CVE-2025-3248)
Description:Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
Description
Mass-CVE-2025-3248
Readme
# Langflow CVE-2025-3248 Exploit Tool

![Severity](https://img.shields.io/badge/Severity-Critical-red)
![CVSS](https://img.shields.io/badge/CVSS-9.8-yellow)

## Overview

This tool exploits the critical Remote Code Execution (RCE) vulnerability **CVE-2025-3248** found in Langflow versions prior to 1.3.0.  
The vulnerability exists in the `/api/v1/validate/code` endpoint which improperly executes user-supplied code without authentication or sandboxing.

> ⚠️ **Warning:** Use this tool only on systems you own or have explicit permission to test. Unauthorized use is illegal and unethical.

---

## Features

- Test if a Langflow instance is vulnerable to CVE-2025-3248  
- Demonstrate remote code execution by executing arbitrary payloads  
- Simple CLI interface with customizable target URL
File Snapshot

[4.0K] /data/pocs/9da6d0cf5b857c44255faada0be6b3dc3bdc590f ├── [4.7K] Mass-CVE-2025-3248.py └── [ 801] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →