- Home
- Alerts & Advisories
- Alerts
- Active Exploitation of Critical Vulnerability in Langflow
Active Exploitation of Critical Vulnerability in Langflow
19 June 2025
Security researchers have identified a new active campaign that is exploiting a critical vulnerability (CVE-2025-3248) in Langflow to launch distributed denial-of-service (DDoS) attacks.
Background
Security researchers have identified a new active campaign that is exploiting a critical vulnerability (CVE-2025-3248) in Langflow to launch distributed denial-of-service (DDoS) attacks. Langflow, a tool to build and deploy Artificial Intelligence (AI) agents and Misson Control Platform (MCP) servers, had earlier released security updates to address the vulnerability in March 2025. The vulnerability has a Common Vulnerability Scoring System (CVSSv3.1) score of 9.8 out of 10.
Impact
Successful exploitation of the Mising Authentication vulnerability could enable unauthenticated attackers to execute arbitrary code via crafted HTTP requests. The vulnerability could allow unauthenticated attackers to achieve remote code execution (RCE), potentially resulting in full system compromise and exfiltration of sensitive data on affected Langflow servers. Additionally, threat actors have been observed exploiting this flaw to deliver the Flodrix botnet malware, primarily for conducting DDoS attacks.
Known Exploitation
This vulnerability is reportedly being actively exploited and the Proof of Concept exploit is publicly available.
Affected Products
This vulnerability affects Langflow versions prior to 1.3.0.
Mitigation
Users and administrators of the affected products are advised to peform the following mitigations:
Immediately upgrade Langflow to version 1.3.0 or later, which introduces strict authentication on the vulnerable endpoint.
Restrict public access to Langflow endpoints.
Monitor for indicators of compromise linked to the Flodrix botnet.
References
https://thehackernews.com/2025/06/new-flodrix-botnet-variant-exploits.html
https://gbhackers.com/hackers-weaponize-langflow-vulnerability/
https://www.trendmicro.com/en_us/research/25/f/langflow-vulnerability-flodric-botnet.html