Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence

Posted on May 6, 2025May 8, 2025 By CWS

Could 06, 2025Ravie LakshmananCybersecurity / Vulnerability
A just lately disclosed crucial safety flaw impacting the open-source Langflow platform has been added to the Recognized Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Safety Company (CISA), citing proof of lively exploitation.
The vulnerability, tracked as CVE-2025-3248, carries a CVSS rating of 9.8 out of a most of 10.0.
“Langflow comprises a lacking authentication vulnerability within the /api/v1/validate/code endpoint that permits a distant, unauthenticated attacker to execute arbitrary code through crafted HTTP requests,” CISA stated.

Particularly, the endpoint has been discovered to improperly invoke Python’s built-in exec() operate on user-supplied code with out sufficient authentication or sandboxing, thereby permitting attackers to execute arbitrary instructions on the server.
The shortcoming, which impacts most variations of the favored device, has been addressed in model 1.3.0 launched on March 31, 2025. Horizon3.ai has been credited with discovering and reporting the flaw in February.

In response to the corporate, the vulnerability is “simply exploitable” and permits unauthenticated distant attackers to take management of Langflow servers. A proof-of-concept (PoC) exploit has since been made publicly out there as of April 9, 2025, by different researchers.

Information from assault floor administration platform Censys exhibits that there are 466 internet-exposed Langflow situations, with a majority of them concentrated in the USA, Germany, Singapore, India, and China.
It is at the moment not recognized how the vulnerability is being abused in real-world assaults, by whom, and for what function, though the SANS Expertise Institute stated it recorded exploit makes an attempt focusing on the flaw towards its honeypots. Federal Civilian Government Department (FCEB) companies have time till Could 26, 2025, to use the fixes.
“CVE-2025-3248 highlights the dangers of executing dynamic code with out safe authentication and sandboxing measures,” Zscaler famous final month. “This vulnerability serves as a crucial reminder for organizations to method code-validation options with warning, significantly in functions uncovered to the web.”
Replace
Assault floor administration platform Censys stated it has noticed 1,156 uncovered Langflow servers on-line, practically half of that are situated in the USA. Of those, 360 servers look like working a weak model. As many as 509 servers didn’t promote a model.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Added, CISA, Critical, Evidence, Exploitation, Flaw, KEV, Langflow, List, Ongoing

Post navigation

Previous Post: Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi
Next Post: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Related Posts

Critical RCE Bug Rated 9.9 CVSS in Backup & Replication The Hacker News
APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs The Hacker News
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization The Hacker News
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host The Hacker News
Why Traditional DLP Solutions Fail in the Browser Era The Hacker News
ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News