HomeVulnerabilityEssential Langflow Flaw Added to CISA KEV Listing Amid Ongoing Exploitation Proof

Essential Langflow Flaw Added to CISA KEV Listing Amid Ongoing Exploitation Proof

A not too long ago disclosed crucial security flaw impacting the open-source Langflow platform has been added to the Recognized Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Safety Company (CISA), citing proof of lively exploitation.

The vulnerability, tracked as CVE-2025-3248, carries a CVSS rating of 9.8 out of a most of 10.0.

“Langflow incorporates a lacking authentication vulnerability within the /api/v1/validate/code endpoint that permits a distant, unauthenticated attacker to execute arbitrary code through crafted HTTP requests,” CISA stated.

Cybersecurity

Particularly, the endpoint has been discovered to improperly invoke Python’s built-in exec() perform on user-supplied code with out ample authentication or sandboxing, thereby permitting attackers to execute arbitrary instructions on the server.

The shortcoming, which impacts most variations of the favored instrument, has been addressed in model 1.3.0 launched on March 31, 2025. Horizon3.ai has been credited with discovering and reporting the flaw in February.

Critical Langflow Flaw

In accordance with the corporate, the vulnerability is “simply exploitable” and permits unauthenticated distant attackers to take management of Langflow servers. A proof-of-concept (PoC) exploit has since been made publicly accessible as of April 9, 2025, by different researchers.

Cybersecurity

Data from assault floor administration platform Censys reveals that there are 466 internet-exposed Langflow situations, with a majority of them concentrated in the USA, Germany, Singapore, India, and China.

See also  New 'ALBeast' Vulnerability Exposes Weak spot in AWS Utility Load Balancer

It is at the moment not identified how the vulnerability is being abused in real-world assaults, by whom, and for what objective. Federal Civilian Govt Department (FCEB) companies have time till Could 26, 2025, to use the fixes.

“CVE-2025-3248 highlights the dangers of executing dynamic code with out safe authentication and sandboxing measures,” Zscaler famous final month. “This vulnerability serves as a crucial reminder for organizations to method code-validation options with warning, notably in functions uncovered to the web.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular