The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Langflow flaw, tracked as CVE-2025-3248 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog.
Langflow, a popular tool for building agentic AI workflows, is impacted by a code injection vulnerability in the /api/v1/validate/code endpoint (CVE-2025-3248), allowing remote attackers to execute arbitrary code.
Researchers from cybersecurity firm Horizon3.ai discovered this easily exploitable flaw, with a post showing how remote code execution can be achieved through a Python reverse shell.
Users of Langflow are advised to upgrade to version 1.3.0+ or restrict access, as more than 500 instances are exposed on the Internet, and addressing these vulnerabilities is crucial according to CISA directives.