Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence

Posted on May 6, 2025May 8, 2025 By CWS

Could 06, 2025Ravie LakshmananCybersecurity / Vulnerability
A just lately disclosed crucial safety flaw impacting the open-source Langflow platform has been added to the Recognized Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Safety Company (CISA), citing proof of lively exploitation.
The vulnerability, tracked as CVE-2025-3248, carries a CVSS rating of 9.8 out of a most of 10.0.
“Langflow comprises a lacking authentication vulnerability within the /api/v1/validate/code endpoint that permits a distant, unauthenticated attacker to execute arbitrary code through crafted HTTP requests,” CISA stated.

Particularly, the endpoint has been discovered to improperly invoke Python’s built-in exec() operate on user-supplied code with out sufficient authentication or sandboxing, thereby permitting attackers to execute arbitrary instructions on the server.
The shortcoming, which impacts most variations of the favored device, has been addressed in model 1.3.0 launched on March 31, 2025. Horizon3.ai has been credited with discovering and reporting the flaw in February.

In response to the corporate, the vulnerability is “simply exploitable” and permits unauthenticated distant attackers to take management of Langflow servers. A proof-of-concept (PoC) exploit has since been made publicly out there as of April 9, 2025, by different researchers.

Information from assault floor administration platform Censys exhibits that there are 466 internet-exposed Langflow situations, with a majority of them concentrated in the USA, Germany, Singapore, India, and China.
It is at the moment not recognized how the vulnerability is being abused in real-world assaults, by whom, and for what function, though the SANS Expertise Institute stated it recorded exploit makes an attempt focusing on the flaw towards its honeypots. Federal Civilian Government Department (FCEB) companies have time till Could 26, 2025, to use the fixes.
“CVE-2025-3248 highlights the dangers of executing dynamic code with out safe authentication and sandboxing measures,” Zscaler famous final month. “This vulnerability serves as a crucial reminder for organizations to method code-validation options with warning, significantly in functions uncovered to the web.”
Replace
Assault floor administration platform Censys stated it has noticed 1,156 uncovered Langflow servers on-line, practically half of that are situated in the USA. Of those, 360 servers look like working a weak model. As many as 509 servers didn’t promote a model.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Added, CISA, Critical, Evidence, Exploitation, Flaw, KEV, Langflow, List, Ongoing

Post navigation

Previous Post: Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi
Next Post: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Related Posts

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network The Hacker News
DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks The Hacker News
Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure The Hacker News
FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage The Hacker News
Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents The Hacker News
Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News